By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Q&A: Assume your network is already compromised, says Ixia
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Q&A: Assume your network is already compromised, says Ixia
Enterprise

Q&A: Assume your network is already compromised, says Ixia

Alfred Siew
Last updated: August 31, 2016 at 6:29 PM
Alfred Siew
Published: August 31, 2016
6 Min Read
SHARE

Naveen Bhat_Profile Picture

High-profile attacks in the past few years have made cyber security a topmost concern not just for corporations with massive IT infrastructure but also anyone with a smartphone or connected device.

Visit a dodgy site or download a malicious app, and you could have your data locked out until you pay up a ransom to get your life back.

Never has the threat become so pronounced than today, and the costs are higher than before, said Naveen Bhat, who is managing director for Ixia in Asia Pacific.

The company, which tests and helps secure enterprise networks, has seen cyber attacks ramp up in sophistication and scale.

There are millions of cyber attacks happening every day, and the successful ones hide for months in many corporate networks, said Bhat.

In this month’s Q&A, he advocates more proactive planning and testing by enterprises to weed out potential threats that may be hidden from view.

Indeed, he advises organisations to work out their cyber security strategy by assuming that they have already been compromised.

Q: The general public has sat up and opened their eyes to the threat of cyber security in recent years. Of the many factors, what is the biggest one that has made the threat more menacing of late?

A: The biggest threat that impacts the general public is ransomware. In the past, cyber security was seen as an issue that haunts large corporations with large databases.

However, cyber criminals can now impact the lives of the general public by freezing their personal computing devices and demand ransoms to free the frozen files.

Cyber criminals are quick to capitalise on trends. One recent example is the first Pokémon GO-themed ransomware in the world, capitalising on an app that has taken Singapore and many parts of the world by storm.

Cyber criminals had gone the extra mile to add a hidden backdoor Windows admin account on the Pokémon GO app and spread that to other drives and created network shares.

While this, at the outset, may seem confined to merely consumer devices, it is actually a real problem for enterprises that may experience Pokémon GO traffic in their networks without even realising.

Another indication of the impact of cyber security on the general public is the number of fraud checks that are interrupting credit card transactions.

Credit card companies are spending a lot more money on fraud checks due to compromised accounts, which in turn affects consumers whose accounts are blocked frequently.

Q: From your experience, what are the most common security loopholes that come up?

A: Carelessness and ignorance are the two biggest security loopholes today. While there are many technical loopholes that could be discussed, we need to talk about the level of carelessness of people and organisations to follow the required security checks.

Secondly, ignorance of the variety of attack mechanisms is another loophole.

As illustrated in the security risks associated with Pokémon GO, it is possible to manage and enforce control over the app’s data running through the corporate networks, but it does mean that corporate IT teams are aware of such a threat to begin with.

Q: It frequently takes months for intrusions to be detected, if at all. Should organisations adopt an attitude that their networks are already penetrated? How do they prepare for this?

A: The average time taken to detect intrusions could be around nine months. Couple this with the fact that millions of attacks are happening every day – it is safe for every organisation to adopt the attitude that they have been compromised.

Once compromised, they should look at forensics, and also track outgoing data to malicious sites to track which devices and networks have been penetrated.

Most importantly, they should constantly take a proactive stance to build resilience in their networks to the latest attacks vectors in the market.

Q: What lessons can Singapore draw from previous high-profile break-ins overseas, as it looks to be a highly-connected smart nation?

A: Be proactive, and enforce strict regulations. Just like Singapore took a very hard line on criminal activity and law enforcement in the past to create a safe and secure nation, the time has come to translate these ideas into the cyber security arena.

I do believe that real-world scenario testing is the way to ensure true IT system resiliency. Ixia’s team of researchers regularly hold ‘what if’ testing with customers, using live traffic to simulate cyber attack procedures.

The aim is to use a constant ‘offense’ method to find vulnerabilities in products, people or processes, and eliminate them before they can be exploited.

Equinix to raise data centre temperature ranges to boost energy efficiency
Q&A: Alcatel OneTouch eyes Singapore market with low-cost smartphones
Q&A: Singapore can make engineering interesting again
Windows 8 Enterprise touts mobile productivity features
Gartner: Worldwide IoT spending to grow to US$348 million in 2016
TAGGED:cyber securityIxiapenetration testingQ&A

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Frontier Digital Ventures listed on Australian Stock Exchange
Next Article Expect more Asian crowdfunded projects, as Kickstarter launches in Singapore, Hong Kong
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?