<img height="1" width="1" style="display:none" src="https://q.quora.com/_/ad/1fa075f6a9144556974dd51ae0b653c7/pixel?tag=ViewContent&amp;noscript=1">
All Posts

Anatomy of an Attack - Staying ahead and protecting yourself

Trent: Hi there welcome back to Techscoop thankyou for joining us and today you’re in for an absolute treat because once again I’m joined by Ryan Economos from mimecast and we’re talking about the evolution of attacks, this week I want to talk about hwy it’s so hard to stay ahead of all of these attacks. So thankyou fro joining us Ryan.

So what do you think of that?

Ryan: I think it’s obviously really difficult to stay ahead of the attacks all of the time. The reality is that so long as technology has existed people have looked at ways to exploit that. Whether its identifying technological gaps or identifying gaps within the orgasnation from an education perspective. We’re seeing that attacksers themselves are forming communitieis, sharing ideas, sharing pursuits, it is very difficult to always be that one step ahead. Don’t get me wrong we absolutely try to be the other thing is that In terms of the cadence of new attacks that are out there. If you take phishing sites for an example the last stat I recall realing was the anti phishing work group - 46,000 new phishing sites published.  So it’s impossible to stay ahead when they’re developing at that rate.

Trent: So the question is, what can we do to stay ahead?

Ryan: Two key componenents – First is technology. Technology obviously exists that can bridge the gap and it can provide a superior level of protection based on the attacks that we’re seeing. If you take Mimecast as an example, we’ve got services that specifically focus on stopping those targeted attacks, so URL rewrites, it can analysie website content, sandboxing of attachments to check the behavior to ensure the documents you’re using are actually safe. As well as the checks against impersonation type attacks. But the second key component on top of the technology is end users. The reality is that the attacks are having an impact on organisations because users are making decisions that compromise the environment. It is really important to build up that concept of a human firewall and that can be done via a number of different mechanisms, whether it’s posters in the lunch room, emails that get sent out from IT team. Whether it’s phishing simulation attacks. There’s also the need to have frequent training. There’s no point running a cyber security awareness program if it’s a point in time check. It needs to be continuous, you need constant touch points to make sure it’s effective. User education is a huge part of it 

Trent: I suppose that borders on another topic that I want to get into in the future. Possibly I can call you back and we can have a chat about it. IT would be about creating a security culture, or a culture that really fosters security and having a secure environment. Everyone is accountable for their actions and interacting with emails or what they’re doing on the computers.

Ryan: I think security is no longer the problem of just IT, it’s a business problem now. So the responsibility sits with each and every user within the organisation, technical or not.

Trent: I think that’s all we have time for today, but thankyou again Ryan for joining us one more time. It’s been great, I’ve learnt a lot and I’m sure everyone out there has benefitted from the wealth of knowledge that you’ve amassed after working at Mimecast for such a long time.

Ryan: Thankyou.

 

Related Posts

The 5 types of Insider Threat Facing Businesses

There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of the four quarterly reports issued to date. These can further be broken down into threats which arise out of negligence and risks which arise out of criminal intent. 

Why an automated IT Quarterly Report just isn’t good enough

Back in the dying days of the 1990s, a truly funny movie called Office Space came out. While the Y2K bug was all the rage at that time, this isn’t what the movie chose to send up. Instead, its most memorable moments revolve around whacking a defenceless printer to pieces in a field, and the endless, mindless ‘TPS reports’ demanded by an overbearing and insensitive boss.

  • 4 min read
  • Sep 9, 2019 12:50:41 PM