Page 21 - Cyber Defense eMagazine - November 2017
P. 21

3)  Isolation  technology:  According  to  studies,  no  fewer  than  95%  of  data  breaches  start
                       with an e-mail phishing campaign, according to SANS Institute, with malware attached to
                       a message in the form of a document, or including a link to a rogue site, where victims
                       experience a drive-by malware attack. So it stands to reason that keeping users away
                       from these files will go a long way towards improving security. The problem, of course, is
                       that  phishing  messages  are  often  designed  to  look  like  the  real  thing,  with  socially-
                       engineered messages that claim to be from the boss or from colleagues that seem to
                       require  the  attention  of  recipients.  Some  of  these  messages  and  documents  may  be
                       caught by filters or sandboxes, but not all, as is clear from the ongoing and increasing
                       number of data breaches (one could assume that companies like Equifax had the latest
                       and greatest cybersecurity technology at its disposal).


               In a virtual container scheme, security systems check files and connections for activity in a “safe
               zone,” with all aspects of the file or connection tested to ensure that it behaves as it is supposed
               to – that a file does not seek to query areas of the registry that it ostensibly has no business with
               or tries to execute code that should not be associated with it, or that a connection does not try to
               hijack a user to another, rogue site. If the file/connection does try that, the system will keep it
               away  from  the rest  of the  network,  but  still  display  the  contents  of  the  document  or  the  site.
               These ideas are certainly not the “silver bullet” that will eliminate cyber-insecurity – one would
               think that with $90 billion spent on cybersecurity, we would have found that by now – but they
               are  likely  to  make  organizations,  and  the  workers  who  make  them  thrive,  safer  and  more
               productive, whether they are in the office or out of it.



























                   21    Cyber Defense eMagazine – November 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   16   17   18   19   20   21   22   23   24   25   26