You should know by now, half way through Cyber Security Awareness Month, that just checking the cyber security box with a few well know measures is not enough with today’s extremely sophisticated cyber criminals and even Ransomware as a Service offerings. It is the equivalent of an ostrich putting its head in the sand or an opossum playing dead to ignore an impending threat.
A Cautionary Tale
You have probably seen hundreds of breach stories by now and may even be desensitized by their impact. However, it is important to recognize the root cause of these breaches in order to learn from these cautionary tales. For example, Ellen Yu reported in ZDNet on Singapore's most recent severe cybersecurity breach that:
“…a July 2018 security breach that compromised personal data of 1.5 million SingHealth patients. The incident also compromised outpatient medical data of 160,000 patients that visited the healthcare provider's facilities, which included four public hospitals, nine polyclinics, and 42 clinical specialties.”
She went on to discuss why this happened:
“Investigation into the July 2018 incident reveals tardiness in raising the alarm, use of weak administrative passwords, and an unpatched workstation that enabled hackers to breach the system as early as August last year.”
If you still need convincing, then check out our previous blog on “The Staggering Cost of Cyber Threats.”
4 Common Inadequate Measures
For decades, there have been numerous technologies and cyber security measures that organizations have relied upon that unfortunately don’t really meet the standards required to truly prevent zero day and other malicious code entering your network today. The top four you should investigate further include
- Trusting Your Employees: You have probably figured out by now that your employees are your greatest asset but also your most vulnerable liability when it comes to cyber security. Using email communications and just trusting that employees won’t mismanage their passwords, fall prey to a phishing scam or fail to update their workstation when IT sends out a change notice is a recipe for disaster.
- Trusting Your Firewall: Most cyber protection strategies started with the premise of keeping the bad guys out, so firewalls were heavily relied upon for this strategy. They can be effective for the broadest of advanced persistent threats, but still will allow some penetration from the outside and almost no protection form insider threats.
- Trusting Your Signature-based Prevention: Once some poor unfortunate organization has been hit by a new malware attack, cyber security vendors can identify and update their signature files in order to protect others, however, the threat of zero day attacks has become so prevalent that signature-based solutions alone are far from adequate protection today.
- Trusting Your Sandbox Alone:The introduction of sandboxes greatly increased your cyber threat protection, but unfortunately at a significant overhead and cost if used alone. This is why we have discussed how to add “Nitrous Oxide For Your Sandbox.”
A Better Way
Solebit’s SoleGATE uses a static analysis which is faster, more accurate, not OS version dependent and covers 100% of your code, with complete visibility. With SoleGATE, every line of code is evaluated, making Sandbox evasion techniques ineffective. The platform is agnostic to file type, client-side application type, or the client operating system used within the organization. Unlike a Sandbox which has to simulate specific customer environments, SoleGATE provides protection regardless of operating system, CPU architecture, and function (client, server) of the targeted machine.
Mimcast also recently acquired Ataata for security awareness training expanding Mimecast offerings for cybersecurity awareness capabilities with leading training content, risk scoring and real-world simulation attack scenarios.
See for yourself what SoleGATE can do to deliver evasion proof security for your organization today. Register for a free trial today.