02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

51<br />

The point is that 94% of malware attacks conducted through email, according to the Verizon <strong>2019</strong> DBIR.<br />

Spinning up a seemingly legitimate email from a trusted individual or brand is fairly easy when anyone<br />

can become a Photoshop wizard overnight. Email addresses and domain names can be masked, and it<br />

is alarming how much personal information is publicly available on social media accounts. An enterprising<br />

threat actor could easily find the name and email address of a manager or vendor and send an email with<br />

a malicious attachment, such as a link to a compromised site or fake login page. By sending multiple<br />

versions of the spoofed email with slight variations, threat actors can scale the attack, knowing that at<br />

least one will eventually be clicked by the user.<br />

This shift in strategy means that no matter how strong your cybersecurity defenses, your organization’s<br />

cybersecurity posture is almost entirely reliant on users. Web filtering through traditional security solutions<br />

need a reputational footprint of an attack based on third-party or internal threat intelligence. If an attack<br />

is new or has been slightly modified, it can sneak through. In fact, many malware attacks have grown<br />

sophisticated enough to identify whether they are in a sandbox and shut down until instructed to ramp up<br />

again when executed on users’ devices. Users – whether apathetic, unsavvy or both – are then<br />

responsible for determining what they can safely click on. As a result, phishing attacks are growing<br />

increasingly more successful. Verizon’s research also shows that 30% of phishing messages are opened<br />

by targeted users, so it is clear current defense mechanisms are not working.<br />

What’s an enterprise to do? How can an enterprise build a robust cybersecurity strategy when attackers<br />

continue to target the weakest link: the user? Traditional cybersecurity solutions and conventional threat<br />

prevention products rely on detect and respond tactics and have failed to keep up with the evolving nature<br />

of sophisticated phishing attacks. These solutions analyze web links in an email and make a ‘good vs.<br />

bad’ determination. Unfortunately, this approach requires a reputational footprint to make a decision that<br />

does not detect (and ultimately block) new or modified attacks.<br />

Enterprises need to rethink how they can protect users from cybersecurity threats by implementing a<br />

Zero Trust Internet policy. Instead of trying to determine what web content is bad, enterprises should just<br />

assume that all content is risky and isolate everything to be safe. Making an isolate or block determination<br />

is much safer than an allow or block approach, preventing even unknown attacks from executing malware<br />

on end users’ devices or directing users to fake login pages where credentials can be stolen. All email<br />

links and attachments can be opened in a safe isolation session in the cloud, protecting users from giving<br />

away credentials or opening attachments in a sandbox or on the endpoint.<br />

The result: 100 percent malware free email.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!