Cyber Defense eMagazine July Edition for 2022
Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Poor Identity Management Amplifies Ransomware<br />
By David Mahdi, Chief Strategy Officer and CISO Advisor, Sectigo<br />
While ransomware is malware, security leaders must go beyond legacy anti-malware approaches to<br />
mitigate risk. Ransomware is a data-centric threat; that is, ransomware preys on corporate data. Cunning<br />
and successful ransomware attacks hijack user access with an aim to encrypt sensitive files, stealing<br />
data. So, if ransomware is all about the data and the hijacking of user access to get to the data, then the<br />
more data a user can access, the more attractive target the user is <strong>for</strong> the attacker.<br />
Ransomware is a multi-faceted cybersecurity issue, and best practice dictates using email security and<br />
antivirus, in addition to other tools to fend it off. Indeed, while these are good best practices, IT leaders<br />
need to undergo a crucial perspective change when it comes to ransomware and understand it isn’t solely<br />
a traditional malware problem. Bad actors want access to data, and they gain access by compromising<br />
user accounts, or in other words, by compromising the identity layer of an organization. Without<br />
considering the importance of identity and data access, organizations will remain vulnerable to attack.<br />
Yet, organizations and security leaders can’t simply lock down identity and data access to prevent<br />
ransomware. Typically, IT departments tend to over privilege users to avoid interrupting business. While<br />
this approach generally helps day-to-day operations, it’s also precisely what allows bad actors who<br />
breach the perimeter to run amok throughout the environment. If a highly privileged user and their<br />
associated accounts have a lot of access, when compromised, the amount of damage could be<br />
catastrophic. Focusing on identity and data security in terms of right-sized access will significantly reduce<br />
the attack surface <strong>for</strong> many threats, including ransomware.<br />
With that in mind, enterprises must focus on establishing and maintaining trust <strong>for</strong> every single identity in<br />
their environment, both human and machine (software, bots, devices, applications, etc.). Otherwise<br />
known as identity-first security, the aim is to mitigate the damage from identity and data-centric attacks,<br />
such as ransomware.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 113<br />
Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.