Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 9 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

One year on: how retail hacks showed APTs in practice

by The Gurus
November 24, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

It’s now almost a year since Target admitted the loss of customer data following an extremely sophisticated hack.

 
Involving one of Target’s suppliers, a number of point of sale devices and a large number of customer records, the breach was one of the largest in recent history. Target bounced back and dealt with the damage astonishingly quickly but still incurred high damages.
Furthermore, although spending on security has risen by 7.9 per cent in recent years, security vulnerability exploits made by advanced persistent threats (APTs) are still worrying IT managers across the country – so what can be learnt from the Target problems, one year on?

Advanced threats like this often use multiple channels to find and exploit vulnerabilities in organisational cyber-infrastructure, blending physical, digital and social components to find and exploit gaps. This makes it essential for enterprises to mimic this and audit IT security infrastructure from both a technological and human perspective.

IT security managers are usually familiar with core security functions including firewalls, encryption and user authentication. Some organisations have already begun to automate key functions including patch management – although more still have yet to take this critical first step into automation. This in itself is worrying – many breaches happen when patches and vulnerability fixes are already available; to rely on manual patching is essentially playing Russian roulette with organisational security.

Furthermore, in today’s APT world, automating as much of this work as possible is not only recommended but necessary. However, if IT staff can move away from ‘keeping the lights on’ and monitor dashboards summarising security activity, they will be in a far better position to spot anomalous patterns of activity rather than being stuck in day-to-day work.

In addition, the sheer number of devices operating outside of the traditional IT infrastructure make managing and monitoring devices very difficult. In fact, Cisco statistics predict that by 2020 each user will have 6.58 devices.
 

Whether this includes retailers with employees working from tablets in store, or a media outlet with journalists regularly running and downloading from Dropbox, the number of non-traditional and potentially unsecured devices on networks is growing, creating new points of vulnerability.

 

Trying to cope with all of these devices on the network can be a headache, but by switching to a user- rather than device-centric model can help the IT department to do this effectively. Furthermore, by divorcing security from the user – for example, by keeping enterprise application data stored in the cloud, away from consumer-owned devices, and encrypted in transit – organisations can often avoid vulnerabilities entirely.

Finally, the Target breach raises an important point around supplier relations and security. Organisations must work together to ensure that they not only share common commercial goals, but also common security processes and standards. Bodies such as the PCI DSS (Payment Card Industry Data Security Standard) have led the way in offering a solid baseline for security, but this breach showed that there is often a need for a comprehensive security audit, not just within the four walls of the organisation, but across the supplier ecosystem.

Many organisations have already started to shift IT security strategies to increase the degree of automation across the IT estate and re-examine how they secure mobile and flexible workers. However, it is only by meshing these approaches, and audit not only the organisation’s own security perimeter, but also defining security process for close partners, that IT staff can match their approaches to those taken by hackers.

 

This will both increase the chances of spotting areas which APTs may exploit early – or indeed, securing them before they are exploited. Gaining complete visibility over the IT ecosystem is a lofty goal, but the Target breach demonstrated that protecting against hackers and ultimately safeguarding company reputation in the age of APTs requires a very comprehensive, fresh approach to security.

 IMG_0784 Peter Durrant

Peter Durrant is enterprise sales director for the UK at LANDESK

 

FacebookTweetLinkedIn
Tags: attackPOSRetail
ShareTweet
Previous Post

Sophisticated Regin backdoor Trojan spied on targets since 2008

Next Post

Why you (probably) shouldn’t use Detekt

Recent News

Ransomware

Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots

June 9, 2023
code

Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted

June 8, 2023
large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information