Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
4 Signs Your Organization is a Good <strong>Cyber</strong> Attack Target, and<br />
What to Do about It<br />
By Nathan Burke, CMO, Axonius<br />
By now we’re all well aware of the transformative technologies accelerating across the enterprise today.<br />
Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT have completely<br />
transformed the way we work. However, in the process it removed the perimeter from the security picture,<br />
creating a massive, distributed attack surface.<br />
As a result, organizations are under a continual onslaught of cyber-attacks leading to well-publicized data<br />
breaches. As their security defenses become more sophisticated, attackers will become increasingly<br />
opportunistic, looking to exploit lapses in IT environments.<br />
This is especially true for organizations with complex IT environments. In <strong>2019</strong>, companies that exhibit<br />
the following four characteristics are most likely prime targets for attackers:<br />
1. Proximity to Value: Whether it’s money or data, organizations that store valuable information will<br />
be targets. Banks are an obvious target since they are just one step away from actual dollars.<br />
However, organizations that store personal data (such as identity) to open a credit card or bank<br />
account need to be on guard.<br />
2. Centralized Data: Companies that centrally store valuable information will be attractive targets<br />
to attackers. Taking the Marriott breach as an example, it was far easier for the attackers to obtain<br />
500M records from the hotel’s centralized reservation database than it would have been to go<br />
after individual franchise networks.<br />
3. Heavy Reliance on third-parties: As we saw during the Target breach, the more organizations<br />
rely on third-parties, ecosystem providers and supply chain players, the higher risk of a breach<br />
that is outside of the organization’s control.<br />
70