| |||||||||
| |||||||||
Current Filter: Security>>>>>Masterclass> The Data Breach Blindspot Editorial Type: Masterclass Date: 01-2016 Views: 2377 Key Topics: Security Data Breaches Shadow IT Key Companies: Certes Networks Key Products: Key Industries: Retail | |||
| How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights It's an unfortunate fact and one that modern organisations need to come to terms with: data breaches are inevitable. Cyber security simply isn't working anymore, and organisations must recognise that breach detection and protection alone aren't enough to keep the hackers at bay. The attention now has moved to breach containment, a strategy that focuses on blocking lateral hacker movement and limiting breach scope. This requires organisations to think altogether differently about their security architecture design. Instead of concentrating solely on building walls to keep people out, the focus needs to be on containing the breach and minimising the extent of it by building walls between different parts of the infrastructure. This, in turn, will combat the 'data breach blindspot', which represents a common attack vector used in all the recent major data breaches. Universally, hackers compromise a single enterprise user and are then able to get past firewalls and hop from internal system to internal system, undeterred by threat prevention or detection systems. Many organisations currently don't have the necessary security strategies in place to stop this from happening, creating a vulnerability caused in part by the following:
• User behaviours and the proliferation of new smart devices, which involves users regularly bringing personal devices and applications into the enterprise environment, outside the control or awareness of the traditional IT department (Shadow IT)
SOFTWARE-DEFINED SEGMENTATION
LIMITING THE SCOPE Additionally, as and when a breach is detected, the segmentation policy means an organisation has immediate visibility into the extent of the breach - enabling a targeted, rather than system-wide, lockdown, and allowing a far more confident and measured response to media, shareholders and customers. When research reveals that financial services companies can take up to 98 days to detect intrusion on their networks, and 197 days for retail companies, it's clearly time for organisations to make a change. What's worse, an estimated 95% of breaches occur as a result of a user being compromised (2015 Verizon Data Breach Investigation Report). It is only by deploying an effective breach containment strategy, following a software-defined segmentation approach, that organisations can truly keep a breach under control. Learn more at CertesNetworks.com | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |