Tag Archive for: stopping

Is Stopping a Ransomware Attack More Important than Preventing One?


The sophistication and frequency of ransomware attacks is growing. According to Akamai CTO Robert Blumofe, ransomware has become “a repeatable, scalable, money-making business model that has completely changed the cyberattack landscape.” Conti, for example, the cybercrime giant that operates much like the businesses it targets – with an HR department and employee of the month – not only aims to make money but to carry out politically motivated attacks. (Learn more in our Ransomware Threat Report H1 2022.)

And although ransomware is still mostly targeted at large organizations, small to medium sized organizations are increasingly falling victim. Lincoln College in Illinois announced in May that it will close its doors after 157 years, citing a ransomware attack as a contributing cause.

How to avert a ransomware disaster

It makes sound security sense for organizations to put strong measures in place to stop ransomware from gaining access to their IT environments (often referred to as north-south movement). But our increasingly complex traffic flows coupled with distributed workforces have left many security organizations playing catch up and making tough decisions on tradeoffs. In this post-breach world, focusing on implementing microsegmentation to ensure the organization can stop a ransomware attack – rather than trying to prevent one – can be the best way to ensure there are no disasters.

Microsegmentation accomplishes two things organizations desperately need. The first is visibility. Enforcing a zero trust policy – which is the ultimate goal – begins with understanding the assets that are being protected and how they are (and should be) communicating with each other. Microsegmentation helps accomplish this using artificial intelligence (AI) and machine-learning (ML), which classifies traffic flows and labels data. Security teams then write rules with the confidence that those rules will do what’s needed: prevent malicious actions without disrupting the business.

Second, microsegmentation enables granular policies that restrict lateral movement to precisely prohibit malicious behavior without false positives. This is the coup de grace…

Source…

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries


When it comes to cyber attacks, most businesses think: “It could never happen to us,” but some plots are just hitting a little too close to home.

Related: T-Mobile breach reflects rising mobile device attacks

DevOps Experience

For instance, if you’ve ever played Grand Theft Auto, you know the goal is quite simply mass destruction: Use whatever resources you have at your disposal to cause as much damage as you possibly can and just keep going.

Not familiar with Grand Theft Auto? Let’s try Super Mario Bros. then. As Mario makes his way through eight increasingly difficult worlds, each of them is protected by a castle. As Mario reaches the end of each castle, he can defeat Bowser.

This is not unlike the mindset of modern cyber attackers – they’re wreaking havoc and becoming pros at finding ways to get away with it.Living-off-the-land (LotL) attacks are providing a way for adversaries to stay under cover. Attackers use tools and features that are already available in the systems they’re targeting so they look like legitimate users — until they steal your crown jewels.

But you can fight back. There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. To date, the main goal in mind has been to prevent attackers from breaching your defenses and making their way into the castle, but the reality is this approach is flawed.

Israeli

Attackers will get in, it’s only a matter of time. Traditional network security solutions, such as firewalls, are not effective at detecting and stopping lateral attack movement – and that’s where the real damage is done. Many forms of access control and endpoint protection, such as EDR, are nothing more than a checkpoint that provides unfettered access once defeated – like Mario raising a flag after beating a level.

To take the analogy further, only after defeating Bowser does Mario learn that it wasn’t the real Bowser after all and that “our princess is in another castle.” Rather than just keeping Mario out of the castle entirely – i.e. deploying traditional perimeter defenses – in this scenario, Bowser deployed an advanced threat protection by sending…

Source…

Shortage Of Workers Skilled At Stopping Ransomware Attacks Makes Companies Vulnerable To Hacks – CBS Dallas / Fort Worth


Source…

Cyber security experts say they are being prevented from stopping computer fraud because criminals have to let them access machines – Telegraph.co.uk

Cyber security experts say they are being prevented from stopping computer fraud because criminals have to let them access machines  Telegraph.co.uk
“computer security news” – read more