Sunday Times (Sri Lanka)

Ways of staying ahead of cybercrimi­nals

-

Dhanya Thakkar, Vice President Asia Pacific, Middle East and Africa ( AMEA), Trend Micro, recently attended t he 11th Annu a l Cybersecur­ity Conference in Sri Lanka organised by the Sri Lanka Computer Emergency Readiness Team (SLCERT).

He addressed the event as a keynote speaker and a panelist. Here are excerpts of his presentati­on:

“In late October, more than 19,000 debit and credit cards from 22 Pakistani banks were stolen, making this the biggest of its kind to hit the country’s banking system. Shortly after, more than 10,000 cards were put up for sale on the dark web, ranging from US$ 100 to $ 160 apiece. This attack resulted in more than 200 accounts being affected and millions of rupees lost. Responding to the attack, all compromise­d banks temporaril­y has suspected usage of their cards outside the country while investigat­ion is underway.

This is evidence that we no longer live in a world where amateurish attacks are carried out to probe vulnerable systems on a small scale. In a world teeming with digital informatio­n and data, cybercrimi­nals are getting organized and systematic. Equipped with technical know-how and innovative technology, they are after bigger targets. At this point, you ought to ask – how can companies protect themselves better?

Here are four simple steps you can follow to strengthen your security posture.

Prediction: Staying a few steps ahead

Aircraft pilots, particular­ly those flying at night, can often fall victim to what’s called the false horizon effect. They mistakenly think a series of lights in the distance as the horizon, become disoriente­d and endanger their passengers – if not for the aviation instrument­s that tell them otherwise. Similarly, the enterprise security cloud can act as the instrument­ation for companies looking to combat cybersecur­ity. The level of visibility and connectivi­ty of the cloud allows it to pool various shapes of data from across a business, and channel this data to AI components to detect patterns and predict possible future outcomes. Through this level of predictive analysis, businesses can better assess risk, anticipate threats and be more informed in their decisions, making prediction a necessary pre- emptive component to any business’ security strategy.

Prevention: It’s better than cure

Research shows that the average cost of a security breach to an organisati­on totals to almost $ 4 million while the average zero- day exploit remains undetected for 118 days, giving hackers and cyber-attackers plenty of time to scope things out and hit businesses where it hurts the most. But two strategies can help prevent unwarrante­d attacks; system hardening to eliminate the number of entry points accessible by outsiders; and network isolation to ensure that a compromise in one sector will not affect the entire ecosystem. On top of that, an analytics- driven system run on the cloud should be able to detect threats on the fly and engage automated realtime protection, fending off attacks before they penetrate even the first layer of defences. Prevention may seem difficult but will ultimately pay off as businesses come under pressure to stay resilient and protect their networks.

Detection: Powered by AI

Research has shown that it takes over an average of 99 days before targeted attacks are detected, with over 53 per cent of these attacks being discovered externally. For many businesses, this time to detection is way too long, but employing teams to constantly comb networks to detect intrusions is a costly and timely affair.

Automated cloud solutions like Trend Micro’s Hybrid Cloud security leverage constant monitoring, analytics, AI and Machine Learning algorithms to watch networks and workloads across multiple cloud or hybrid cloud systems, detecting anomalies and attacks even as they happen. Not only is detection faster and more accurate, such security platforms also score the riskiness of user behaviours across the network and alert teams to any potential breach. This reduces time to detection, allows teams to confirm and prioritise threats, and provides the means for more accurate containmen­t – resulting in stronger risk management throughout the business.

Response: Swift, effective and AI-supported

But more than anything, businesses need to ensure that they have policies in place that prioritise the execution of their cybersecur­ity strategies, and processes to address weaknesses within and without after an attempted attack. The best method to combat cybersecur­ity, at the end of the day, is still awareness, and businesses must make it a priority to educate and remediate flaws within department­s, parties and networks within their organisati­on – or remain hampered in their ability to protect their networks.

As more and more data points and networks of businesses are connected digitally to the cloud, the effort it puts into prediction, prevention, detection and response to cyberattac­ks will ultimately determine its effectiven­ess of combating today’s digital menaces. How many steps have you taken to secure your business?”

Newspapers in English

Newspapers from Sri Lanka