Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The enterprise is in an arm's race with cybercriminals

David Geer | July 8, 2016
The deep web, dwell time, and the balance of power in cybersecurity

Most attacks start as successful phishing exploits or other social engineering, suggesting that enterprises need to find ways to make employee education more precise, clear, and effective, producing far-reaching results. “Some companies set up systems for IT departments to launch faux phishing attacks from inside, report successful attacks back to employees and bosses, and educate people that if they are not 100-percent sure that an email is legit, it could end up in their performance review,” says Hendler. Enterprises that use approaches like this to reinforce what the signals are that flag phishing and why it is so important to avoid falling for it will go a long way toward enlisting employees in the fight against cybercrime and keeping attackers out.

Organizations need to incentivize employees to immediately alert IT when they do click on a phishing email so that IT/security can contain the attack as early as possible. This is a positive alternative to simply punishing employees for clicking the wrong link.

On the offensive, the enterprise needs to apply experienced, capable, and informed hacker minds to cybersecurity challenges. According to Tendell, these professionals can focus on sources of attack data such as conversations in the criminal hacker community and real-time monitoring of outbound traffic based on knowledge of ports criminal hackers frequently use such as port 31337 and the ploys they use with them.

These white hat hackers can then help organizations to close the loop on vulnerabilities, respond to and contain attacks, and remain proactive in the ongoing war against cybercrime.

It won’t be easy

It isn’t easy to close the gaps that make social engineering possible or to entrust good guy hackers with cybersecurity. But it is the job that cyber thugs have thrust upon us.


Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.