This is an article by Danny Lopez, CEO of Glass wall solutions

With cybercrime in place 600% in 2021, organizations face increasing risks in the public and private sectors. Threats are not only more and more prolific, they are more and more complex and more difficult to fight. A good example is the recent high-profile supply chain attacks, which the European Union Agency for Cyber ​​Security (ENISA) has predicted to be. quadruple by the end of 2021, compared to 2020. These attacks are hidden in legitimate software products, where malware is embedded in updates that ultimately allow an attacker to enter the target computing environment. By the time the threat is discovered, the attacker already has access to the system and all the sensitive information it stores.

These are the circumstances under which the SolarWinds attack of 2020 occurred, affecting more than 17,000 of its customers. In addition to impacting companies such as Microsoft, Intel and Deloitte, this attack was almost certainly designed to penetrate very sensitive government agencies, including the United States Department of Homeland Security, the National Nuclear Security Administration and parts of the United States. Pentagon.

Learn from the best

The reason it took such a sophisticated attack to penetrate these government institutions is that they make the more traditional attacks very difficult. The defense and intelligence sectors are rarely affected by file-based attacks, for example, because for these organizations cybersecurity is a matter of national security, not just a business affair. As a result, there are a series of lessons that commercial enterprises could learn from the defense and intelligence communities to improve their cybersecurity strategies.

A key part of the problem is that by the time an attack has penetrated the target systems, most of the damage has been done. Instead, it is much more effective to put measures in place to identify and protect against threats such as those posed by file-based malware. Being responsive is the biggest security mistake most organizations make. In order to stay protected from various online dangers, organizations must be able to remove threats from their files on the same scale and level as the defense and intelligence communities.

The secret weapon

Due to the potentially catastrophic consequences of any cybersecurity mistake made in the defense and intelligence sector, these agencies cannot rely on reactive solutions – their frontlines must be impenetrable. For many, content disarmament and reconstruction (CDR) technology has offered a proactive solution to the file-based threats that are now gaining momentum in the private sector.

Proactivity is at the heart of CDR technology. The protection it offers is instantaneous, unlike responsive security solutions such as antiviruses, as files and documents go through a quick four-step process.

  • Step 1 – The file is first inspected to confirm that its digital DNA does not deviate from the manufacturer’s “well-known” specification. All irregularities are instantly rectified.
  • 2nd step – Then the file is cleaned up to remove any high-risk active content, such as embedded links or macros.
  • Step 3 – After removing any high-risk content, the file is rebuilt to the “well-known” specification and all safety blind spots are closed.
  • Step 4 – Once the first three steps are completed, the file is threat-free and can be book to the user with the assurance that it is completely safe.

Such a quick and easy process creates strong cyber protection because it is very difficult for a threat to exist in a file that has been the subject of a CDR. This is very valuable for organizations because it gives them the assurance that every file can be opened safely. Significantly, neither security nor productivity should be compromised as its instantaneous nature performs the process without disrupting business operations.

Today, cyber criminals are incredibly sophisticated and use technology to design malware and create compelling versions of every file so that they are undetectable by traditional security solutions and compelling to users. However, since the CDR examines the “digital DNA” of the file, not the visual layer, it cannot be fooled by the sophisticated algorithms of cybercriminals who frequently evade detection.

Stay one step ahead

It’s time for business leaders to change their approach to cybersecurity as the sustainability of traditional security approaches continues to decline. In order to modernize their methods, leaders must be open to change and innovation, ready to face the risks and problems that may arise. Even if they have not yet been the victim of a cyber attack or data breach, organizations should not assume that they will stay safe forever.

Cybercriminals and their attacks are not always easily identifiable, but having the right mindset and approach to cybersecurity will give businesses the best opportunity to defend against attacks and protect their systems. The defense and intelligence sectors are currently reaping the benefits of CDR and the commercial space could learn a lot by following their example.

Danny Lopez is the CEO of an award-winning cybersecurity company Glass wall, which offers unique protection against sophisticated threats thanks to its revolutionary technology. Prior to joining Glasswall in 2019, Lopez had a successful international career in banking, marketing, diplomacy and technology, most notably as the Senior CEO of London & Partners and Managing Director of the International Trade Department. from the British government.


Source link

Previous

ANALYSIS: Key cybersecurity credits compulsory - In a bar near you?

Next

CISA issues sweeping federal directive on government cybersecurity

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also