For decades the biggest threat your cyber security strategy had to deal with was from the outside of your organization. So, the concept of digital walls (antivirus and network firewalls) meant to keep hackers out of your network were the cornerstone of everyone’s strategy. It became quickly obvious that insiders (sometimes knowing and sometimes unknowing) were just as bad, if not worse, so cyber security strategies expanded with identity, authentication, authorization management as well as security awareness training. But is the focus on inside and/or outside threats really just a symptom or is it the disease? Isn’t it ultimately just about ensuring your content is safe?
Inside And Outside Threats
The good news is that there is strong data on the nature of breaches and how they change over time. According to the 2018 Data Breach Investigations Report which is the 11thedition published by Verizon “This year we have over 53,000 incidents and 2,216 conﬁrmed data breaches.” With the following breakdowns:
- “73% perpetrated by outsiders
- 28% involved internal actors
- 2% involved partners
- 2 % featured multiple partners”
The tactics used were reported with the following breakdown:
- “48% of breaches featured hacking
- 30% included malware
- 17% of breaches had errors casual events
- 17% were social attacks
- 12% involved privilege misuse
- 11% of breaches involved physical actions”
While outside threats are all clearly malicious, there is a class of inside threat that is completely oblivious to their role in the breach. This is why the report identifies insider threats as internal actors as in many cases an employee may do something inadvertently such as click a link in a phising scam.
Who Are The Victims
Every organization that relies on information technology is a potential victim, despite the belief that you may be too small, or even to large, to be affected. Going back to the Data Breach Report referenced above, the victims were identified as:
- “24% of breaches affected healthcare organizations
- 15% of breaches involved accommodation and food services
- 14% of breaches of public sector entities
- 58% of victims are categorized as small businesses”
What is possibly more interesting is what was commonly observed by these breaches which included:
- “49% of non-POS malware was installed via malicious email
- 76% of breaches were financially motivated
- 13% of breaches were motivated by gain of strategic advantage (espionage)
- 68% of breaches took months or longer to discover”
The unifying target across all of these breaches was content. This implies that the real focus for an effective cyber security strategy is to focus on ensuring safe content instead of focusing exclusively on protecting from inside and outside threats.
Coverage For Your Content
It doesn’t matter if the threat is from the inside or outside as they all focus on damaging or stealing your content. Because of this, we believe that if you protect your content then you will protect your environment from both inside and outside threats. Solebit’s SoleGATE (now part of Mimecast) uses deep inspection and analysis methods that can interpret and detect malicious code in real time and immediately block threats. It delivers the promised value of a sandbox but without the overhead in time delays, resources and costs.
With SoleGATE every line of code is evaluated, making Sandbox evasion techniques ineffective and on average, the analysis time is between milliseconds up to a few seconds as opposed to Network Sandboxes typically taking 5-15 minutes to perform the same analysis.Bottom line is that your users will be much happier now that content is flowing faster throughout your organization and finance will be happier with the reduced expenses.
See for yourself what SoleGATE can do to deliver evasion proof security and ensure the content is safe in your organization today. Register for a free trial today.