Going on the Offensive—Standing up against Cyber-Attacks

- July 28th, 2011

 

After the explosive March hack that infiltrated over 24,000 key files, Pentagon officials are ready to change their strategies regarding U.S. cyber security. While the incursion was one of the worst single incidents the U.S. Department of Defense has ever seen and may impact the design of the U.S. weapons system, it’s just one in a series of cyber attacks our country has experienced this year.

So, how can we take a stand against the hack-happy bad guys? What can we do take back our systems and prepare for the dreaded day when our own systems get hacked? For starters, say goodbye to the “I didn’t know it could happen to me” excuse. And, try these five steps as a starting point:

  1. Align your security efforts with where the hacks are happening. Recent incidents serve as a profound reminder that we are continuing to spend money in the wrong places. Market research firm Technavio reports 70 percent of security threats are targeted at the application layer of an organization, yet according to Verizon Business, only 10 percent of security budgets are spent on securing this layer of a company. We need to refocus our budgets in order to align them with the importance of effective cyber-attack plans. You wouldn’t spend $100 dollars on windshield wipers and $10 on your brakes, would you? Your application layer is the foundation to your process-to-process communications, ensuring that each application run communicates effectively with another application and if we know that threats are aiming for it, then that’s where we need to focus the majority of our resources.
     
  2. Prioritize your IT assets. Approach your cybersecurity with the notion of Murphy’s law — if it can be hacked, it will be hacked. Nothing is 100 percent secure so what you should do is hope for the best and prepare for the worst. All employees and IT assets are not created equal. There are certain employees and certain devices that contain more sensitive data than others; thus, a proper security plan needs to put more emphasis on strategic assets, as opposed to treating all IT assets equally.
     
  3. Educate company employees. Security breaches will happen to every company at some point in their lifespan and typically, the breaches occur due to careless behavior by employees, as opposed to a sophisticated, well-thought out attack. People will always be the weakest link and the best way companies can prevent security breaches is by educating their employees on the evolving basics of smart security habits.
     
  4. Take a layered approach. We are a nation that thrives on the one-stop shop methodology and cybersecurity solutions only further emphasize our need for a pain-free strategy. Unfortunately though, there isn’t a technology on the market that will solve all of your security needs. Instead, companies need to implement a “defense-in-depth” approach with a platform that includes anti-virus, patch management and application control. All of these solutions must talk to each other in order to be successful.
     
  5. Realize security is also a Mac issue. These days, security breaches affect every type of device—including Macs. While attacks may not have been prevalent in Macs in the past because there was less to financially gain from hacking smaller-market-share Mac users, consumerization has had a deep impact on security and the enterprise. Within the past three years, more Macs (and social applications) have entered the corporate environment than ever before, and there is plenty to gain from hacking these systems, especially now that VMWare can virtualize both Windows and Macs.

Ensuring organizations and people remain secure is never an easy feat. There are protocols and guidelines that have to be considered, and I understand firsthand what you are up against when you begin to implement a proactive plan of attack. Making sure your leadership team realizes the company is vulnerable is step number one. Then, take the initiative, educate your team and company users, and stand ready to go from defense to offense.


About the Author

served as Chairman and CEO of Lumension, where he was responsible for leading the company's overall strategic direction to drive revenue growth and profitability as well as overseeing the day to day operations. Clawson brings more than 20 years of software industry experience and has a successful track record of running high tech companies.

Follow Pat on Twitter @pclawson





Comments

2 Responses to “Going on the Offensive—Standing up against Cyber-Attacks”

  1. Mike Winkler says:

    Right on.
    We used to be able to black list a few intruders and allow the rest of the world onto our PCs. looked at it objectively it was like only locking your house against known criminals and saying everybody not in the mug book can come right into your house and pour themselves a drink.
    A lot of things come down to positive data control. We often find ourselves following that old joke: doing the same crazy thing again and again and expecting different results. the bad guys are not using last years methods of offense bu somehow we feel content using last years methods of defense.

  2. Pat Clawson says:

    Yes, this is the reality of today and the future. And the positive security model is reinventing itself from the more hardcore yes/no of yesteryear to a considerably more operationally useful version that leverages trust.

Leave a Reply


IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Comments


Share

blog.lumension.com