02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4 Signs Your Organization is a Good <strong>Cyber</strong> Attack Target, and<br />

What to Do about It<br />

By Nathan Burke, CMO, Axonius<br />

By now we’re all well aware of the transformative technologies accelerating across the enterprise today.<br />

Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT have completely<br />

transformed the way we work. However, in the process it removed the perimeter from the security picture,<br />

creating a massive, distributed attack surface.<br />

As a result, organizations are under a continual onslaught of cyber-attacks leading to well-publicized data<br />

breaches. As their security defenses become more sophisticated, attackers will become increasingly<br />

opportunistic, looking to exploit lapses in IT environments.<br />

This is especially true for organizations with complex IT environments. In <strong>2019</strong>, companies that exhibit<br />

the following four characteristics are most likely prime targets for attackers:<br />

1. Proximity to Value: Whether it’s money or data, organizations that store valuable information will<br />

be targets. Banks are an obvious target since they are just one step away from actual dollars.<br />

However, organizations that store personal data (such as identity) to open a credit card or bank<br />

account need to be on guard.<br />

2. Centralized Data: Companies that centrally store valuable information will be attractive targets<br />

to attackers. Taking the Marriott breach as an example, it was far easier for the attackers to obtain<br />

500M records from the hotel’s centralized reservation database than it would have been to go<br />

after individual franchise networks.<br />

3. Heavy Reliance on third-parties: As we saw during the Target breach, the more organizations<br />

rely on third-parties, ecosystem providers and supply chain players, the higher risk of a breach<br />

that is outside of the organization’s control.<br />

70

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!