Cyber Security Trick Or Treat

While dressing in costume and going door to door asking “trick or treat” has only been going on in the United States since the 1920, the practice actually dates back to the middle ages and the tradition of mumming in northern Europe. The premise has always been the same: trick or treaters demand the owners of the location to give them a treat (usually food) and threatened to cause mischief (a trick) if the owners refused. Any cyber security professional will recognize this as the same behavior cyber terrorists use with Ransomware attacks.

What Keeps You Awake At Night?

Insomnia is a common affliction of cyber security professionals. It seems that every day there is a new threat, breach or technology that must be identified, analyzed and dealt with in some form or another.

StaySafeOnline is trying to find ways to help with your insomnia and has this to offer with respect to National Cyber Security Awareness Month:

“With recent legislation and support from the White House, cybersecurity is continuously a popular topic of discussion and rightfully so. More specifically, there is even stronger focus on consumers and their cyber safety. Everyone at every age is a consumer, and thus this year each theme will focus on the consumer and his/her needs regarding cybersecurity and safety. NCSAM 2018 also marks the 8th anniversary of the STOP. THINK. CONNECT.™ campaign. Each year, NCSAM highlights the overall message of STOP. THINK. CONNECT.™ and the capstone concepts of the campaign, like “Keep a Clean Machine,” “Protect Your Personal Information,” “Connect with Care,” “Be Web Wise,” “Be a Good Online Citizen,” “Own Your Online Presence” and “Lock Down Your Login.””

While, this feels very consumer focused, there are clearly elements appropriate for company-wide use in order to prevent specific breaches at the employee level.

Cyber Security Tricks

As stated in the introduction, the closest example of a security cyber trick or treat is a ransomware attack. Refer to our previous blog titled “5 Ways Ransomware Can Enter Your Network” for a refresher if you need one. It is so prevalent that there is even Ransomware as a Service offerings for those too lazy to develop it themselves.  Unfortunately, if you or your organization have already been infected with Ransomware then the trick has been triggered and you are literally being held for the treat (ransom) to get out of it.

Cyber Security Treats

The best treat you can get for your organization this Security Awareness month is Solebit’s SoleGATE (now part of Mimecast). SoleGATE uses a static analysis which is faster, more accurate, not OS version dependent and covers 100% of your code, with complete visibility.  With SoleGATE, every line of code is evaluated, making Sandbox evasion techniques ineffective. On average, Solebit analysis time is between milliseconds up to a few seconds. Network Sandboxes typically take 5-15 minutes to perform the same analysis. 

Using deep inspection and analysis methods, SoleGATE is able to interpret and detect code in real time and immediately block threats from penetrating your organization. DvC™ has no assumptions on threat heuristics and behavior and assumes that there is no legitimate reason for executable code to be present in a data file, it relies solely on identifying code existence on non-executables files.

See for yourself what SoleGATE can do to deliver evasion proof security in your organization. Register for a demo today.

Recent Posts