Page 107 - Cyber Defense eMagazine June 2020 Edition
P. 107

Not only do IoT devices share some of these vulnerabilities, but they also have a much weaker security
            posture overall. They are often far less secure out of the box because that makes deployment easier.
            Many use default or weak passwords and rely on older protocols without built-in firewalls, direct user
            interfaces, or automated patching. Finally, manufacturers usually sell these items at low margins, so they
            have little incentive to enhance security or fix issues.

            Since the Mirai malware went live in 2016, hackers have developed many  different IoT-based DDoS
            attack strains. These botnets discover newly connected devices within 60 seconds of them going online
            and weaponize everything from smartphones to smart homes. Even worse, hackers can now target entire
            IP address ranges by combining multiple vectors or overwhelming  systems through short, sustained
            DDoS attacks.

            These budding Mr. Robots and Lisbeth Salanders also have a much larger pool of victims to choose
            from, along  with seemingly unlimited resources. That allows them to change tactics on the fly while
            accessing more attack surfaces through cloud services and mobile networks.

            Hackers who use these sophisticated methods make it harder to contain damage. Cybercriminals deploy
            attacks as a smokescreen while they invade systems and access massive amounts of sensitive data.
            They then distribute it widely, which can lead to severe financial losses.

            Enterprise IT teams must employ advanced defense strategies to analyze and fight back against these
            threats.  Telecommunications  carriers  and  processing centers  specifically  are  subject  to  more  hacks,
            which can target both the providers themselves and their customers. Because of this, all parties need to
            plan for the worst by using smart data to optimize security.



            Organizations Can Update, Innovate, and Evolve

            Even the most well-prepared companies should maintain constant vigilance against formidable online
            threats. The digital world has changed rapidly in recent years, so organizations need to protect all their
            distributed environments, on-premises and in the cloud, by employing DDoS prevention solutions.
            IT teams will increase their chances of successfully countering opponents if they connect and collaborate
            while simplifying workflows and staying resilient. These professionals should routinely secure vulnerable
            hardware and software to ensure only legitimate users can access those services. They also need to
            monitor all traffic and respond immediately if suspicious vectors appear.

            Enterprises should further conduct regular attack mitigation drills and employ automated detection tools
            during normal operations. That way, staff can evolve internal processes to defend networks and respond
            swiftly to cyberthreats using the proper protocols.

            Business leaders also need to ensure they don’t put a lid on staff innovation after hacks occur. When
            companies  suffer  lengthy  outages  following  cyberattacks,  some  C-suite  leaders  think  twice  about
            adopting any new technologies.

            That’s a dangerous proposition, since businesses end up trailing the competition. Organizations need to
            encourage the use of modern tools that protect industries while decreasing risk.




            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         107
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   102   103   104   105   106   107   108   109   110   111   112