Connect with us

Expert Speak

Network Security Strategies That You Shouldn’t Ignore

Published

on

You don’t want to wake up one day to the news that your organization’s network security has failed. When a network failure occurs, critical operations may be hindered, and sensitive data could be leaked without proper security reinforcement.

In March 2020, Sina Weibo, China’s biggest social media platform, disclosed that a hacker gained access to a segment of its database, affecting 538 million users. The compromised information included real names, site usernames, gender, locations, and phone numbers.

Similarly, LinkedIn found itself in a tricky spot when the data of 700 million users was offered for sale online. However, LinkedIn denied the occurrence of such a data breach. Most organizations take their network security very seriously. According to a new International Data Corporation (IDC) spending guide, global security investments are expected to experience 12.1% growth in 2023, reaching a total of $219 billion.

Let’s look at a few ways you can improve your network security.

Organisation-wide visibility
It’s important to integrate applications and technologies from different vendors to keep the network secure. Organizations need a central viewpoint for all the data from each system in their IT infrastructure. Let’s say a multinational company has offices worldwide. In this case, having enterprise-wide visibility is an important parameter for securing its network. One way to achieve this is by deploying an enterprise network monitoring tool. It helps analyze and monitor devices, including routers, switches, and firewalls.

Monitor risk continuously
According to a report by Forrester Research, 74% of companies worldwide, spanning various sizes and industries, encountered a cybersecurity breach in 2022, representing an increase from the 59% reported in 2020. The rising number of cyberattacks is alarming and requires around-the-clock monitoring to mitigate them. The 2020 SolarWinds hack is a perfect example of how a network failure could lead to a catastrophic data breach. Government departments of homeland security, state, commerce, and treasury were all impacted, with evidence of missing emails from their systems.

Private companies, such as FireEye, Microsoft, Intel, Cisco, and Deloitte, also experienced repercussions from the attack. Deploy a robust SIEM solution to analyze and correlate security events across the enterprise to avoid instances of network failure. SIEM solutions monitor and analyze every device connected to the network in real-time and alert you after detecting vulnerabilities.

Use a next-gen firewall
The firewall, as the first line of defence for your organization’s network, must be given the utmost importance when building the network security posture. While a traditional firewall monitors the inflow and outflow of traffic, a next-gen firewall comes equipped with features such as application control, intrusion prevention, and URL filtering. As cyberattacks continue to evolve and increase each day, it is imperative not to rely on legacy firewalls. Instead, deploy next-gen firewalls that offer extensive application control and enterprise-wide visibility.

Update your software
Software updates and patch management, although simple, are crucial to defend your network from cyberattacks. More often than not, vulnerabilities present in various applications leave a loophole for attackers to infiltrate your network.

Keeping your software up to date is one of the easiest ways to secure your network. Since patches and updates for applications are crucial, they shouldn’t be left to the mercy of human errors. Therefore, automate software updates and patches for vulnerabilities using a patch management solution. This ensures the automation of patching and software updates, preventing oversights.

Key takeaways
Securing your network is crucial for maintaining uninterrupted business operations. Implementing a single point of visibility for enterprise-wide network devices, continuous traffic monitoring, next-gen firewall deployment, and regular software updates are essential measures to protect your network effectively. Learn more about network monitoring.

Artificial Intelligence

How AI is Reinventing Cybersecurity for the Automotive Industry

Published

on

Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)

Continue Reading

Cyber Security

Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits

Published

on

Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.

Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.

Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.

Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.

Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”

Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.

Continue Reading

Expert Speak

What the Bybit Hack Reveals About the Future of Crypto Security

Published

on

Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.