Winning the battle against surging cybercrime

Issue 6 2023 Information Security


Caesar Tonkin.

“Cybersecurity peers share a joint purpose to protect organisations from threats and attacks that could be material to staying in business,” says Armata Executive Head, Caesar Tonkin, who led the second Armata cybersecurity industry webinar called Detecting and Protecting against Endpoint Threats.

The key theme at the latest event was that endpoint detection and response (EDR) represents the best chance for organisations to win the battle against a surging cybercrime wave that evolves too fast and is too advanced for traditional tools such as antivirus or anti-malware tools.

During his keynote address, Tonkin presented shocking figures from recent Microsoft research. Some of the insights he shared included that there were 921 parcelled attacks per second in 2022 – a 74% increase from 2021 and that 93% of Microsoft investigations during ransomware recovery engagements revealed insufficient privilege access and lateral movement controls, and that the mean time it takes an attacker to move laterally within a corporate network, once a device has been compromised, is one hour and 45 minutes. Perhaps most startling is that 98% of cyberattacks can be prevented with basic security hygiene.

“From an Armata point of view, we offer our customers help with basics such as security hygiene, but also bring specialised interventions with in-depth aspects of cybersecurity,” he said. He referenced LockBit, which is akin to a ransomware-as-a-service machine. “The pace at which they are targeting organisations, globally and in South Africa, is cause for concern and certainly something that we need to be mindful of in this country,” said Tonkin.

“When we do threat hunting, we analyse the steps that criminals follow – their tools, techniques and tactics. What looks like normal software behaviour – criminal actors can hide behind. These cannot be detected using basic anti-malware,” explained Tonkin, who said that organisations need to develop threat intelligence and the indicators of compromise. This will help them to join the dots as to what threat adversaries are doing to try to infect and cause harm. “As CISOs we must link ransomware attacks to business risk at exco and board level,” he said.

Tonkin introduced cybersecurity expert Emile Coetzee and Microsoft’s Wessel Pieterse, who spoke about the current endpoint threat landscape and what they thought the endpoint threat landscape would look like heading into 2024; the reasons for selecting an EDR platform and not only standard antivirus or anti-malware tools; the business benefits that arise from adopting an EDR platform, automated detection, cyber defence and response handling against advanced threats that could be harmful; and lessons learnt during threat hunting and defending against advanced threats and malware.

A key theme to emerge from these discussions was the pace at which the world of cybercrime is evolving. Even if the usual suspects, such as email compromise or phishing, still show up, the innovative and new ways that criminals are positioning their attacks are cause for concern. Against this backdrop, both panellists and Tonkin agreed that an EDR platform emerges as a non-negotiable for a business wishing to secure its systems.

“Whereas anti-virus, for example, adopts a pre-breach mindset, meaning that it has a series of known signatures or files to scan for,” explained Pieterse, “the industry needed to move to ‘an assumed breach mindset’.

“That's what EDR does. We still look for known signatures, but what we are looking for primarily is a sequence of events and behaviours, using machine learning and artificial intelligence to analyse known behaviours and the normal state of individual endpoints to discover malicious actions and behaviours, rather than relying on a certain set of files or signatures like an anti-virus.”

Coetzee agreed that an EDR was non-negotiable. “My advice to any business, even an SME, would be to invest in a good EDR solution and then partner with a company of experts who can manage the tool for you so that you can sleep at night.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...