Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Why advanced threat protections are the key to outsmarting the next ransomware attack

by The Gurus
August 4, 2017
in This Week's Gurus
Share on FacebookShare on Twitter

The most prevalent cybersecurity concern in 2017 is undeniably ransomware, this year has seen it reassert itself into the public eye in a big way. The WannaCry attack in May was one of the largest ransomware attacks ever, affecting more than 300,000 computers running Microsoft Windows worldwide. What’s more the attack hit a huge range of public and private organisations.
It’s the old adage – fail to prepare and be prepared to fail, and people simply were not prepared for this attack. WannaCry demonstrated that far too many organisations do not have an effective security protocol in place, or don’t take it seriously until it is too late. This particular ransomware took advantage of a vulnerability that had been patched two months earlier in March, but many users had not updated their machines.
To further highlight the issue, when the Petya ransomworm launched just a few weeks later, using the exact same attack vectors, tens of thousands of organisations were still affected. Some are still feeling the consequences.
Cybercriminals are constantly on the lookout for an easy target and coming up with new ways to infiltrate them, with such a clear path in it’s no wonder someone took advantage of it. And organisations aren’t helping, simply because they are not taking care of the basics of patching and updating.
So, what are the options for protection? Well, the most important and arguably easiest protection is to keep your cyber hygiene in check. Keeping operating systems up to date and regularly applying security patches will ensure that weak point in a system is fixed before it can be taken advantage of maliciously. What’s more without these basic processes in place any additional security will be hampered. Additional layers of security need to work with a valid and up to date IT infrastructure to mitigate threats.
Basic hygiene is a must, but preparation is key and new advanced threat protection measures can turn the tables on the cybercriminals.
Sandboxing is a popular security measure that isolates code into a virtual environment where it can be executed and tested before entering the network. Anything detected as malicious will not be allowed to proceed. Unfortunately, some malicious code has developed to a point where it can detect the sandbox and disguise itself until it is cleared onto the network. To stay a step ahead of the cybercriminals, security must now detect malicious code that is actively disguising itself.
This is what advanced threat protection is all about, preparing for the next generation of ransomware attack by proactively detecting certain signatures and behaviours that would suggest a malicious executable. Signature detection traditionally monitors for an exact match of a known malicious code. However, with thousands of variations of the same code able to sneak past these systems newer pattern recognition systems make for a stronger defence.
For example, pattern recognition technology can distinguish over 50,000 code variations within a malware family, and stop them from infecting the network. With this level of coverage malicious code is far less likely to sneak through.
However, recognising code is one thing, it is also incredibly important to deeply analyse and detect code that is searching to see if it is in a sandbox environment. By spotting malicious code in this way it’s possible to render evasion technology irrelevant. A global threat network can provide further advantages, by identifying threats early and sharing that knowledge the spread of malicious software can be halted far more quickly.
If malicious code is not detected by these preliminary measures it is then executed in a sandboxed environment. If at this point it is found it can be shared with other local infrastructure to protect against the spread of the software and similar attacks.
Sandboxes are a powerful tool, but that makes them resource intensive and time-consuming. This is why it is often combined with other tools like firewalls, secure email gateways and endpoint security to minimise resource strain and keep network speeds high.
Ransomware attacks will only become more prolific as Ransomware as a Service (RaaS) gains traction on the dark web, allowing people to simply buy and execute someone else’s malware. On top of increasing the volume of attacks, ransomware is also becoming more sophisticated. Cybercriminals are constantly updating and releasing new iterations of their code in the hopes that it will outsmart security features. With that in mind, it is important that IT professionals take a proactive approach to security to anticipate tactics that hackers might use, perform effective threat analysis, and implement proper security measures to minimise impact.

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

Pentagon tests tablet access to secret classified documents

Next Post

Mitigating ransomware in the healthcare sector

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information