Anton Jacobsz, Managing Director of Fortinet distributor |
In the next
round of the cyber war game, multi-layered targeted offences are being mounted
against selected victims, and few enterprises have the security in place to
withstand these attacks, says Networks Unlimited.
Anton Jacobsz,
Managing Director of Fortinet distributor, Networks Unlimited, says in South
Africa, even large enterprises tend to think that firewalls and anti-virus are
enough. “People think firewalls will sort you out, but the reality is that
attacks have become far more sophisticated and increasingly common. Now,
anyone with a grudge against a particular company can go online and find tools
or hackers who will take down that company’s site for a few hundred dollars.”
Not only is
it easy to attack a company’s site or network, he says, but the reasons for
doing so have become increasingly complex. “It’s not just about money,” he
says. “Attackers might want to put a competitor out of commission, or they may
not approve of the work of the organization, or perhaps they want to take a
high profile company’s site down simply to prove they can.”
Jacobsz says
it happens all the time, and in many cases, victims of a Distributed Denial of
Service attack don’t even know they have had such an attack. “They know their
site went down, but they don’t know why,” he says.
For some
companies, a site loss for a few hours or days impacts on customer confidence
and brand reputation, with relatively low financial losses. But for others,
like online retailers and gaming sites, downtime is a disaster, notes Jacobsz.
“Global gaming sites can literally lose millions if their sites go down for an
hour or more.”
Every organization
stands to lose significantly if attackers penetrate its networks and compromise
its systems or data. Jacobsz notes that in many cases, networks have been
compromised for some time, but the enterprises are unaware of it. “No organization
can pre-empt, detect and defend against an advanced threat 100% of the time,”
says Jacobsz. “But organizations have a better chance of mitigating risk if
they approach IT security from a position of continuous ‘heightened security
resiliency’.”
Jacobsz says
multi-layered attacks demand a multi-layered security strategy: reduce the
surface for unauthorized access; step up threat prevention through advance
systems for inspection of traffic and applications; step up threat detection
using intelligent tools to search for indicators of anomalies within the
network; implement an effective incident response plan and introduce continuous
monitoring. “Enterprises need to be aware that the threats are constantly
changing – just because perimeter protection prevented an attack once, it does
not mean it will do so again. Constantly changing threats demand constantly
evolving solutions and strategies,” he says.
It is also
important to ensure that individuals within the organization are
security-aware, he says. “Around half of malware detections occur as a result
of individuals who report them.” With staff, a traditionally easy way to breach
enterprise defenses is by training employees to be aware of suspicious emails
and report anomalies in applications. This is crucial, he says.
There is no
single solution to protect against all possible attacks, says Jacobsz. “To
minimize their risks, enterprises need to sit down with a partner who specializes
in the security environment and carefully implement a multi-faceted plan
starting with the standards such as firewalls, perimeters; then looking into
authentication layers, threat detection, data analysis and more.”
No comments:
Post a Comment