Key steps to get ahead of the hackers - The EE

Key steps to get ahead of the hackers

Sophisticated large-scale corporate cyber-attacks are on the rise. When successful, says Mike Puglia, chief strategy officer at Kaseya, their impact can be devastating and potentially affect multiple organisations.

Recent breaches have demonstrated the skill and ambition that these cybercriminals employ to gain access to data. British low-cost airline group EasyJet became a target of a highly sophisticated cyber-attack that affected approximately nine million customers last year.

Similarly, a few months later, London’s Hackney Council was hit by a serious cyber-attack which disrupted services for residents and saw private documents published online.

Such attacks emphasise the criticality of a multi-layered security strategy that covers the entire network. So, how can businesses go about creating such a strategy in order to successfully guard against these kinds of attacks?

How to put up your guard

To get ahead of the hackers, IT teams must be wary of unusual password activity, files being created and deleted quickly, inconsistencies in email usage, and data moving around in unexpected ways.

One form of cyberattack is through hackers accessing software patch code and adding malicious code to the patch before it is delivered to customers as a routine update.

This method of attack is especially devious because updates and patches are routine maintenance tasks, meaning IT teams are much less likely to be suspicious about them. Anti-malware solutions are also less likely to scrutinise incoming data like a patch from a trusted vendor.

One key component that enables these types of attacks is credential compromise. Hackers are careful to obtain authentic credentials whenever possible in order to gain entry to the systems and data that they want to access inconspicuously, minimising their digital footprint. As a result, IT teams need to be wary of unusual password activity, such as an uptick in resets or permission change requests.

Phishing isn’t going away any time soon

It’s no secret that the top security vulnerability for every organisation is its people. Consequently, phishing will continue to be a major threat.According to the 2020 Verizon Data Breach Investigations Report, 22% of breaches involved phishing and nearly 30% of security breaches involved internal actors.

Phishing is easy, cheap, and, most importantly for hackers effective. Just a single employee clicking on one phishing message can let loose a wave of havoc. Hackers are now making extensive use of ransomware, which is often delivered through phishing.

To fight back, the industry will need to continue innovating through automated anti-phishing solutions that utilise AI to keep phishing emails out of employee inboxes.

Raise security awareness to lower email threat

Another powerful tool to reduce the risk of a cyber-attack is security awareness training. This can lower the chance of an incident such as a data breach by 70%. From ransomware to spear phishing, email threats are one of today’s most dangerous forms of cyber-attack.

When conducting a phishing attack, cybercriminals will send a malicious email typically disguised as a message from trusted individuals like a manager, colleague, or business associate to trick your employees into activating the enclosed malware or granting unauthorised access. They will ask the individual to take an action by clicking a link or providing sensitive information like login and password credentials.

In response, more businesses should be training employees on how to spot these emails so they can act as an effective form of defence against cybercriminals. Unfortunately, many awareness programs fail because they are not conducted consistently or are not engaging enough for employees.

These trainings have been shown to lower an organisation’s chances of experiencing a damaging cybersecurity incident and are most effective when conducted regularly. In fact, a recent study around the impact of phishing resistance training found employees who received the training started to forget what they had learned after six months.

In order to be fully prepared for the risk of a cyber-attack, security awareness training needs to incorporate both educational materials and frequent phishing simulations accompanied by refresher training for those who engage with the simulations.

Additionally, employees should always check with their internal IT departments if they have any doubts about the credibility of an email they receive. They can help keep their networks safe by carefully screening their emails and being aware of the signs of a phishing email, which include:

  • Small mistakes in spelling, punctuation, usage or grammar
  • Colour palettes and fonts that are just a little bit off
  • Images like signatures or headers that are blurry
  • Sentences that misidentify departments or employees
  • Emails sent from a free email service provider like Gmail
  • Landing pages and emails that use unfamiliar formats

Bolster back-up systems

Finally, it’s important not to forget that back-up systems present an opportunity to access data from many systems in one place. This means that encryption at rest, immutable back-ups, air-gapped data copies and hardened back-up operating environments become critical components to any security strategy. 

Mike Puglia

It’s recommended that organisations follow the 3-2-1 rule, which involves keeping three copies of data on two different types of media, with one version stored off-site. Additionally, as part of a secure backup environment, businesses should consider backup solutions written in hardened-Linux, as ransomware predominantly targets the more prevalent Windows OS.

Organisations should also look for back-up solutions that use machine learning to effectively identify ransomware conditions, making it easier for IT teams to investigate and mitigate the effects of a cyber-attack.

It is also critical that organisations frequently test their backups for issues that could impact a successful recovery. Too often, organisations only realise their back-up solution didn’t work after an incident has occurred. 

Looking ahead

At the start of a new decade cyber-attacks are still growing in sophistication and volume, and businesses around the world are facing an unprecedented level of risk. The security threat increased even further with the rise of remote working over the past year.

This way of working is set to continue into the future in some capacity as many organisations plan a hybrid working model. It is, therefore, more important than ever for businesses to have in place a multi-layered security strategy to ensure they are protected for the months and years to come.

The author is Mike Puglia, chief strategy officer at Kaseya.

Follow us and Comment on Twitter @TheEE_io

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.