Page 120 - Cyber Defense eMagazine June 2020 Edition
P. 120

The threat landscape is evolving

            There is a growing amount of fragmentation in the types of ransomware attacks in play today. Chief
            Security Officers (CSOs) mainly associate ransomware with data encryption. This involves malicious
            agents gaining access to sensitive or mission-critical data and encrypting it. The ‘deal’ in this scenario is
            the business pays a ransom in exchange for files to be decrypted and returned to their original, usable
            form. This is by no means the only threat for CSOs to consider. In other cases, cyber-attackers will upload
            data instead of encrypting it. This means the ransom is to prevent a public leak of potentially sensitive
            data.

            These  disguises  and  behaviours  make  it  very  difficult  to  consistently  defend  against  the  widening
            landscape of threats. The golden rule for organizations to follow is to maintain a clear view of what is
            normal behaviour within their own IT infrastructure. This can be achieved through continuously monitoring
            data and cloud storage, as well as leverage analytics on networks, operating systems and applications.
            This increased awareness of what a secure state of play looks like can make suspicious and malicious
            activity easier to spot, crucially accelerating time to response.

            Making good use of encryption is also key for organizations. If malicious threats cannot ‘see’ your data,
            it’s more difficult for them to use it against you. According to Duo’s Privacy in the Internet Trends report,
            87% of web traffic is encrypted – a number that is rising all the time. However, it is less clear what
            percentage of enterprises’ data is encrypted. Zscaler’s IoT in the Enterprise found that 91.5% of traffic
            on enterprise IoT networks is non-SSL encrypted. These contrasting figures suggest there is a sizable
            gap  between  how  enterprises  generally  are  leveraging  encryption  versus  major  web  platforms  and
            service providers.



            Are backups cyber-crime’s high-value target?

            One area where encryption is vital to bolster organizations’ defences against ransomware and insider
            threats is implementing ‘nearline’ encryption on data backups. The Veeam 2019 Cloud Data Management
            report found that over two thirds of organizations are producing backups of their data. While this is, of
            course, a good thing, imagine the blackmail potential for a cyber-attacker of gaining access to a backup
            of an organization’s entire digital infrastructure?

            Given that cyber-criminals using ransomware to blackmail businesses are looking for data, in theory they
            can find whatever they need in an organization’s backed up files. These could be in all manner of forms:
            from system disks and removable hard drives, to offline tape devices and cloud backups. Whichever
            option a business chooses, the backup repository itself must be protected against attack with an ultra-
            resilient  media  type.  Otherwise,  there’s  a  chance  that  in  attempting  to  protect  business  continuity,
            businesses may be creating a trove of poorly protected data that could be used against them.

            For some threat behaviours, this can be mitigated by encrypting backups every step of the way – from
            the first disk resource on-premises. Encrypting backups historically is a great idea when tapes leave the
            IT  facility  or  if  data  is  transmitted  over  the  Internet.  Given  the  prevalence  of  modern  cyber-threats,
            encryption must take place nearer to the backing up process. The most effective technique however is
            resiliency in the backup data.




            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         120
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   115   116   117   118   119   120   121   122   123   124   125