Tag Archive for: step

XDR: The Next Step in Threat Detection and Response


The global EDR market (Endpoint Detection and Response) is growing rapidly. The Transparency Market Research team predicted that this market will increase at a CAGR of about 21% in the next decade, reported Help Net Security. If it happens, this growth will help the global EDR market surpass a valuation of $13.8 billion by 2030.

What’s Behind the Projected Growth of EDR?

One of the biggest reasons for these optimistic forecasts is the reality that organizations need a systemized approach to defend all their endpoints against digital threats. To put this into perspective, LogMeIn found that the average organization had approximately 750 servers, employee computers, mobile devices and other endpoints connected to the network. 

Such complexity makes it difficult for security teams to effectively manage those devices. In the absence of something like EDR, they’re limited in their ability to adequately defend their organization against both internal and external security threats that impact assets beyond the endpoint.

Not only that, but the number of endpoints will likely increase over the next few years as the world witnesses a surge in the number of connected devices over the next few years. Indeed, Gartner estimated that the number of PCs, tablets and mobile phones would total 6.2 billion units in 2021 before reaching 6.4 billion units a year later. 

“The COVID-19 pandemic has permanently changed device usage patterns of employees and consumers,” explained Ranjit Atwal, senior research director at Gartner, in a press release. “With remote work turning into hybrid work, home education changing into digital education and interactive gaming moving to the cloud, both the types and number of devices people need, have and use will continue to rise.”

Understanding the Pervasiveness of EDR Neglect

Notwithstanding the growing number of endpoints and devices, many organizations aren’t using EDR solutions. A majority (64%) of respondents to a 2020 study said they did not use EDR, reported TechRepublic. Those individuals went on to cite a lack of skilled security staff as one of the reasons why.

This issue in part ties back to the growing complexity of the corporate network…

Source…

First step in fighting ransomware? Stop paying the cyberthieves | Editorial


Running a business or a government agency is difficult enough during the pandemic. Imagine being broadsided by a ransomware attack.

All at once, computer screens freeze. A cybergang pops up to explain the methodology for paying the ransom in cryptocurrency, and what happens if the requisite bitcoins never show up.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmt?4CJAE:@? H:== 6?E@>3 8:823JE6D @7 52E2] $@4:2= $64FC:EJ ?F>36CD[ 5C:G6C’D =:46?D6 ?F>36CD[ >65:42= :?7@C>2E:@? 2?5 @E96C A6CD@?2= 52E2 H:== 86E DA:==65 @FE @?=:?6 7@C :56?E:EJ E9:6G6D 2?5 @E96C 4C:>:?2=D E@ 56G@FC] qFD:?6DD6D 4@F=5 8@ 32?<CFAE[ 8@G6C?>6?E @A6C2E:@?D 4@F=5 D6:K6 FA]k^Am

kAm$@>6 4@>A2?:6D 2?5 8@G6C?>6?E 3@5:6D 92G6 DF44F>365 E@ 4J36C E9:6G6D’ 56>2?5D] x==:?@:D pEE@C?6J v6?6C2= zH2>6 #2@F= @AE65 ?@E E@ A2J] w:D @77:46 H2D 9:E @? pAC:= `_ H:E9 2 C2?D@>H2C6 2EE24< E92E[ 244@C5:?8 E@ E96 924<6CD[ 2>@F?E65 E@ 2 E967E @7 23@FE a__ 8:823JE6D @7 52E2] %96 82?8[ H9:49 42==65 :ED6=7 s@AA6=!2J>6C[ E9C62E6?65 E@ C6=62D6 E96 52E2[ D@>6 @7 H9:49 4@?E2:?65 A6CD@?2= :56?E:EJ :?7@C>2E:@?]k^Am

kAm“*6D[ :E 2?86CD >6] *6D[ :E 7CFDEC2E6D >6[ 2?5 >@DE 46CE2:?=J[ :E’D 6>32CC2DD:?8 E@ 92G6 :E 92AA6? E@ J@FC 286?4J[” #2@F= E@=5 E96 r9:428@ %C:3F?6 2?5 E96 q6EE6C v@G6C?>6?E pDD@4:2E:@?] w6 H@F=5?’E 5:GF=86 E96 C2?D@> D@F89E[ 3FE 96 D2:5 E92E “H92E6G6C E96 2>@F?E H2D[ :E’D @FC A9:=@D@A9J 2D 2 DE2E6 9625 =2H 6?7@C46>6?E 286?4J E92E A2J:?8 4C:>:?2=D :D ?@E D@>6E9:?8 H6 5@ 2?5 ?@E D@>6E9:?8 H6 4@?E6>A=2E6 5@:?8]”k^Am

kAm%92E’D 962CE6?:?8 E@ 962C] !2J:?8 C2?D@> E@ 4J36C E9:6G6D :D E2?E2>@F?E E@ E9C@H:?8 49F> :? E96 H2E6C] pD >@C6 924<65 6?E:E:6D 42A:EF=2E6[ 2 8C@H:?8 ?F>36C @7 924<6CD 2?5 4C:>:?2= @FE7:ED H:== 36 52KK=65 3J E96 62D6 @7 E96 4C:>6 2?5 H:== H2?E :? @? E96 24E:@?] pD :ED @H? 6?E6CAC:D6[ C2?D@>H2C6 92D 6G@=G65 E@ E96 A@:?E E92E 4J36C4C:>:?2=D H9@ 56G6=@A65 E96 C2?D@>H2C6 2C6 ?@H C6?E:?8 @C D6==:?8 :E E@ =6DD E649D2GGJ 325 8FJD H9@ F?=62D9 E96 2EE24<D 2?5 4@==64E E96 >@?6J]k^Am

kAms6762E:?8 E96 D4@FC86 @7 C2?D@>H2C6[…

Source…

S. Korea to step up support to fight ransomware attacks


SEOUL, Aug. 5 (Yonhap) — South Korea’s ICT ministry said Thursday it will expand support to small businesses to help them ward off ransomware threats after it raised the country’s cyberthreat warning level a day earlier.

Cyberattacks using ransomware, a type of malware that holds a target’s data hostage by locking up systems until a ransom is paid, have been on the rise in South Korea, with 78 such attacks reported to the country’s internet security agency in the first half of the year, compared with 39 in 2019 and 127 cases in total last year.

The Ministry of Science and ICT said it would strengthen support to small businesses that have weaker cybersecurity systems by offering them data back-up, encryption and restoration systems to protect their internal data in order to help restore their systems in ransomware attacks.

It will also provide anti-ransomware software for free to medical clinics ahead of the country’s plan to vaccinate around 18 million people aged 18 to 49 later this month to ensure a smooth vaccination rollout.

The ministry added that it is reviewing adding oil refining companies and self-driving vehicle control systems to its list of core facilities that require cybersecurity protection, considering the ransomware attack earlier this year on the U.S.-based Colonial Pipeline, which forced the company to temporarily halt its fuel supplying operations.

The move comes as South Korea braces for even more cyberattacks.

The country’s spy agency elevated its cyber threat warning level for public institutions to the second-lowest level in a five-tier system Tuesday, saying it has identified ransomware attacks targeting major local hospitals.

The ICT ministry has also raised its cyber threat warning status to the same level Wednesday, with expectations that phishing attacks will increase with the scheduled provision of pandemic relief funds.

Experts say ransomware attacks can usually be blocked if companies strengthen their security.

Hackers invest a lot of time, at times even over a year, to conduct such attacks as they have to go through internal systems to find a point to widely distribute the ransomware, according to Lee Jae-kwang, head of the profound analysis…

Source…

Turn off, turn on: Simple step can thwart top phone hackers


RICHMOND, Va. — As a member of the secretive Senate Intelligence Committee, Sen. Angus King has reason to worry about hackers. At a briefing by security staff this year, he said he got some advice on how to help keep his cellphone secure.

Step One: Turn off phone.

Step Two: Turn it back on.

That’s it. At a time of widespread digital insecurity it turns out that the oldest and simplest computer fix there is – turning a device off then back on again – can thwart hackers from stealing information from smartphones.

Regularly rebooting phones won’t stop the army of cybercriminals or spy-for-hire firms that have sowed chaos and doubt about the ability to keep any information safe and private in our digital lives. But it can make even the most sophisticated hackers work harder to maintain access and steal data from a phone.

“This is all about imposing cost on these malicious actors,” said Neal Ziring, technical director of the National Security Agency’s cybersecurity directorate.

The NSA issued a “best practices” guide for mobile device security last year in which it recommends rebooting a phone every week as a way to stop hacking.

King, an independent from Maine, says rebooting his phone is now part of his routine.

“I’d say probably once a week, whenever I think of it,” he said.

Almost always in arm’s reach, rarely turned off and holding huge stores of personal and sensitive data, cellphones have become top targets for hackers looking to steal text messages, contacts and photos, as well as track users’ locations and even secretly turn on their video and microphones.

“I always think of phones as like our digital soul,” said Patrick Wardle, a security expert and former NSA researcher.

The number of people whose phones are hacked each year is unknowable, but evidence suggests it’s significant. A recent investigation into phone hacking by a global media consortium has caused political uproars in France, India, Hungary and elsewhere after researchers found scores of journalists, human rights activists and politicians on a leaked list of what were believed to be potential targets of an Israeli hacker-for-hire company.

The advice to periodically reboot a phone reflects, in part, a change in how top…

Source…