By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Are the bad guys winning with increasingly damaging cyber attacks?
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Are the bad guys winning with increasingly damaging cyber attacks?
EnterpriseInternetTelecom

Are the bad guys winning with increasingly damaging cyber attacks?

Techgoondu
Last updated: October 30, 2017 at 2:31 PM
Techgoondu
Published: October 9, 2017
7 Min Read
SHARE
PHOTO ILLUSTRATION: Pixabay (Creative Commons)

Brought to you by Sophos

Reading the news these days, it is not hard to find yet another headline of a large-scale cyber attack that has affected thousands, maybe millions, of users.

In Yahoo’s case, all 3 billion of its accounts were compromised in a 2013 hack, it said on October 3. Even with the serious breaches seen of late, this incident immediately raises more alarm bells. It begs the question: Are the bad guys winning with their cyber attacks?

As more users store their digital lives on the cloud, service providers are faced with even more responsibility to get their security right. Government agencies as well, as digital IDs become more common for important transactions online.

Before we get there, it pays to understand why the situation is the way it is now. Why, for example, are companies as large and sophisticated as Yahoo so vulnerable? If organisations large enough to be prepared for cyber attacks can fall prey, what can smaller enterprises do?

The answer to that lies first in knowing the origins of today’s cyber threats. While it is true that many state-sponsored hacking efforts are behind the most sophisticated attacks, many threats come from cyber criminals that do not require the know-how required to penetrate well-prepared defences.

One factor behind this is the stockpiling of exploits by agencies such as the National Security Agency (NSA) in the United States. After some of them were stolen by a shady hacking group last year, these cyber weapons were exposed to anyone who would pay for them.

The result was the massive ransomware attacks earlier this year. Using the vulnerabilities exposed by the NSA exploits, hackers were able to attack millions of Windows PCs, locking them up and demanding payment from anyone unlucky enough to be hit.

In truth, the vulnerabilities were made known before the attacks were carried out. However, even with that knowledge, patching hundreds or thousands of machines in an enterprise is no mean feat. In a sprawling enterprise network, many computers can easily remain unpatched.

This makes such weaponised hacks even more threatening in the future. If there are more exploits that are stockpiled, the risk of them being exposed and repurposed as a tool for malicious software will grow.

The other reason why the bad guys seem to be winning is that hacking tools are being sold as a service to cyber criminals. In other words, it does not take a lot of skill or money to get in the act of delivering a piece of ransomware to unsuspecting users worldwide.

Much like how the cloud has enabled businesses to tap on seemingly limitless computer resources, an underground market has mushroomed online to enable criminals to build a ransomware campaign from ground-up.

They can compile the software, choose the target, set the ransom and even hire freelancers to craft e-mails or design fake logos to fool victims into opening up their computers. This easy access to weaponised malware is fuelling the growing volume of cyber attacks of late.

How can enterprises stay vigilant and be protected against such attacks? There has to be a new way of doing things. Endpoint security and network security should be synchronised, for starters.

Would you place a security guard outside a building and one inside but not let them speak to one another? In the same way, cyber security has to be more integrated. It has to be synchronised across a threat surface and be highly automated.

Five attributes define the synchronised security system:

-Ecosystem centric: We must prevent, find and stop breaches across the entire IT ecosystem by operating with full awareness of nearby objects and events.

-Comprehensive: The solution would need to be comprehensive and cover multiple platforms and devices, to defend against attackers who attack the whole IT system, not just its parts.

-Efficient: The solution must lower the team’s workload while improving protection. It cannot add another layer of technology and workload.

-Effective: The solution must effectively prevent, detect, investigate and remediate today’s threats across the entire threat surface.

-Simple: It must be simple to buy, simple to understand, simple to deploy and simple to use.

New solutions have to give a human operator clear visibility of his systems. At the same time, a synchronised security system will isolate an endpoint that is compromised, preventing it from “phoning home” to a hacker’s command and control system.

The Sophos Synchronized Security approach directly links the firewall with the endpoint to share threat intelligence, enabling faster detection of threats and more immediate and targeted response and resolution.

With synchronised security, organisations of any size can advance their defences against increasingly coordinated and stealthy attacks and drive a dramatic reduction in the time and resources required to investigate and address security incidents.

At Sophos, a single interface enables enterprises to manage all Sophos products. From Intercept X, which tackles signatureless ransomware, to Server Security which protects virtual and physical servers, security tools are controlled on a seamless and easy-to-use dashboard.

Called Sophos Central, this unified console also lets users manage Sophos’s Synchronised Security platform. This ensures that your endpoint protection and firewall are talking to each other.

While there is no failsafe way to keep out hackers, enterprises do have advanced tools to keep many increasingly persistent and sophisticated threats at bay.

In the “arms race” with hackers, it is not enough to buy the latest security solutions or build a higher wall – there has to be a rethinking of how security is managed. By being a step ahead, the good guys can win.

Find out more about Sophos Synchronised Security and Sophos Intercept X.

Savvis launches virtual private cloud solution for Asia Pacific
M1 brings unlimited mobile data back to Singapore with S$98 deal
When your company wants to place a corporate Wi-Fi access point in your home
Most APAC firms grapple with outdated technology: NTT Data
Dell to boost APAC sales force
TAGGED:cyber securitymalwareSophosWannaCry

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Which unlimited cellphone plan in Singapore is the best?
Next Article Asean lagging in AI, but Singapore can be regional hub
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?