04.07.2022 Views

Cyber Defense eMagazine July Edition for 2022

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Poor Identity Management Amplifies Ransomware<br />

By David Mahdi, Chief Strategy Officer and CISO Advisor, Sectigo<br />

While ransomware is malware, security leaders must go beyond legacy anti-malware approaches to<br />

mitigate risk. Ransomware is a data-centric threat; that is, ransomware preys on corporate data. Cunning<br />

and successful ransomware attacks hijack user access with an aim to encrypt sensitive files, stealing<br />

data. So, if ransomware is all about the data and the hijacking of user access to get to the data, then the<br />

more data a user can access, the more attractive target the user is <strong>for</strong> the attacker.<br />

Ransomware is a multi-faceted cybersecurity issue, and best practice dictates using email security and<br />

antivirus, in addition to other tools to fend it off. Indeed, while these are good best practices, IT leaders<br />

need to undergo a crucial perspective change when it comes to ransomware and understand it isn’t solely<br />

a traditional malware problem. Bad actors want access to data, and they gain access by compromising<br />

user accounts, or in other words, by compromising the identity layer of an organization. Without<br />

considering the importance of identity and data access, organizations will remain vulnerable to attack.<br />

Yet, organizations and security leaders can’t simply lock down identity and data access to prevent<br />

ransomware. Typically, IT departments tend to over privilege users to avoid interrupting business. While<br />

this approach generally helps day-to-day operations, it’s also precisely what allows bad actors who<br />

breach the perimeter to run amok throughout the environment. If a highly privileged user and their<br />

associated accounts have a lot of access, when compromised, the amount of damage could be<br />

catastrophic. Focusing on identity and data security in terms of right-sized access will significantly reduce<br />

the attack surface <strong>for</strong> many threats, including ransomware.<br />

With that in mind, enterprises must focus on establishing and maintaining trust <strong>for</strong> every single identity in<br />

their environment, both human and machine (software, bots, devices, applications, etc.). Otherwise<br />

known as identity-first security, the aim is to mitigate the damage from identity and data-centric attacks,<br />

such as ransomware.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!