InvestorsHub Logo
Followers 5
Posts 2754
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Monday, 07/06/2020 10:46:32 AM

Monday, July 06, 2020 10:46:32 AM

Post# of 249095
The key to stopping cyberattacks? Understanding your own systems before the hackers strike

https://www.zdnet.com/article/the-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike/

Organisations struggle to monitor their networks because they often don't know what's there. And that allows hackers to sneak in under the radar.

Cyberattacks targeting critical national infrastructure and other organisations could be stopped before they have any impact if the teams responsible for the security had a better understanding of their own networks.

That might sound like obvious advice, but in many cases, cyber-criminal and nation-state hackers have broken into corporate networks and remained there for a long time without being detected.

Some of these campaigns involve intrusions into critical infrastructure where malicious hackers could do damage that could have serious consequences.

But hackers have only been able to get into such as strong position because those responsible for defending networks don't always have a full grasp on what they're managing.

"That's what people often misunderstand about attacks – they don't happen at the speed of light, it often takes months or years to get the right level of access in a network and ultimately to be able to push the trigger and cause a destructive act," says Dmitri Alperovitch, executive chairman at Silverado Policy Accelerator and co-founder and former CTO of CrowdStrike.

That means deep knowledge of your network and being able to detect any suspicious or unexpected behaviour can go a long way to detecting and stopping intrusions.

"Defence can work if you have time. If you're looking inside your systems, hunting for adversaries and applying intelligence, you're able to discover them even if they get in, before they do any damage," Alperovitch adds.

Knowing what's on the network has become even more crucial in recent years, as industrial environments have become increasingly connected with Internet of Things sensors and monitors.

The devices are useful to infrastructure providers because they allow better monitoring of systems for efficiency, maintenance and repair, but if not properly managed, they could be weak points for attackers to access the network.

"We need to be pro-actively testing," says Annessa McKenzie, VP of IT and CSO at Calpine, an American power generation company.

Please see link above for the rest of the article.
=================================================================
As in most industries, it appears that organizations are trying to keep the bad guys off the network. The lack of success in being able to keep bad guys off the network has lead to numerous breaches and cyberattacks. With Wave VSC 2.0 and Wave ERAS only known and approved devices are allowed access to the network. Unknown and unapproved devices (bad guys) aren't allowed access to the company network, and with Wave solutions they could stop cyberattacks!!!
=================================================================
https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.






















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.