Visibility is security

August 2018 Information Security

There is no shortage of cyber threats in the world today and while it’s possible to spend an age listing the various types of cyber-attacks and their methods, they all have one thing in common. Cyber criminals are after data in order to commit online fraud, identity theft and a host of other cybercrimes. To get their hands on what they need, they target organisations that make use of personal data in their everyday operations.

Given that every organisation in the world deals with personal or sensitive data in some form or another, whether global corporation, small business, municipality or financial service, there is no business that is not a potential target for a data breach in the form of a cyber-attack. Despite their differences, two things remain the same for organisations large and small: effective cybersecurity and vulnerability management all hinges on visibility.

See the forest for the trees

It’s easy to get caught up in the hype about cybercrime and lose focus of what’s important: protecting an organisation’s digital assets, infrastructure and people from cyber harm. It’s not possible to protect against something that cannot be seen, which is why vulnerability management and threat detection are such hot topics right now. After all, that’s the element that hackers are relying on: stealth tactics to exploit the weaknesses and vulnerabilities inherent in technology.

As fast as businesses are pushing for new technologies to be able to do new things and innovate, new vulnerabilities are appearing just as quickly. This makes it important to achieve visibility over all connections entering and leaving the corporate network, in order to ascertain that these connections pose no threat.

To this end, there are already gateway security solutions that exist that will integrate easily into the existing network architecture, redirecting all inbound and outbound internet traffic in order to classify and monitor connections. The benefit of utilising intelligent gateway solutions to create visibility is that this unlocks the power of reporting.

Without a meaningful view of the Internet gateway an organisation is at risk by default, so the benefits of an intelligent gateway solution is that creating visibility is made possible through the power of reporting. This depends obviously on artificial intelligence, and the AI engine that runs this is the key to unlocking that meaningful network view.

Simple solutions to complicated problems

To be effective, security needs to be proactive and preventative. Intelligent threat detection solutions need to deliver the ability to block, in addition to visibility and control. This allows the security-conscious network administrator to clamp down on all malware, and proactively identify possible suspicious connections so that these can be dealt with appropriately. By ensuring visibility over all connections in the network at a gateway level, this also performs a preventative security function.

Why is visibility over every single connection so important? Let’s consider ransomware. On average, a hacker, targeting a specific organisation, takes about 180 days from point of penetration before they can successfully encrypt the entire organisation’s data.

However, if the network administration team has visibility into all of the connections on the network, it becomes possible to more effectively identify suspicious connections, report on them, and have them blocked and thus neutralised in under an hour.

The benefits of visibility and control

Such an approach to cybersecurity is a very effective way of killing off potentially risky connections in a proactive manner. Unless it’s been deemed safe, disable suspicious connections. Once disabled, it becomes possible to safely assess that connection and if it is deemed safe, it can be added to a whitelist of security exceptions.

This approach is two-fold: block all connections to known malware and phishing sites, and report on those with the option to allow or kill. It is this reporting function that is especially important, because these phone-home ransomware connections don’t present themselves as known malware if your organisation has been specifically targeted. As we add more devices to the Internet of Things and we start to build more connections with the world and devices around us, it’s better to err on the side of being too restrictive and blocking as much as possible, than not.

It must be stressed, however, that technological security measures are insufficient on their own. Given that the weakest link in any security system will always be the human element, security awareness training and risk management education is important and is a necessary component of a successful cybersecurity strategy based on visibility.

For more information, contact LucidView, 086 110 3117, www.lucidview.net





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...
Organisations fear AI-driven cyberattacks, but lack key defences
Kaspersky Information Security News & Events Training & Education
A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
Know who’s spying on you
Kaspersky Information Security Products & Solutions
According to the latest State of Stalkerware report, 40% of the people surveyed worldwide stated they have experienced stalking or suspect they are being spied on. A solution for Android is now available.

Read more...
Cybersecurity needs 4,7 million professionals
Information Security
Despite all the efforts organisations worldwide put into preventing cyberattacks, global cybercrime has snowballed to $9,2 trillion in 2024 and is expected to grow by another 70% to $15,6 trillion by the end of a decade.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...