The Titanic Effect: Refocusing on Prevention

Over the course of the last year, I realized how much enterprises are focused on fixing single cybersecurity problems – instead of preventing them. Today, ransomware is seen as the top challenge and the number of attacks is growing quarter by quarter.

Source: https://www.proofpoint.com/sites/default/files/pfpt-us-tr-q117-threat-report.pdf

While most companies today are mainly alarmed about crypto trojan infections, there are cyberthreats out there that companies should be even more concerned about, namely data stealers and cyberespionage tools like backdoors and remote access trojans (RATs).

Ransomware is visible – in fact, it is the biggest differentiator compared to other malware types – victims are actively prompted to pay the ransom. But most malware is designed to run invisibly, hide and operate silently, without leaving many traces. You can compare Ransomware to the visible tip of an iceberg. But what about the invisible threats that lurk under the water surface?

Ransomware today makes up a big chunk of the overall malware landscape, but the truth is that it’s only a fraction of the overall threat landscape we’re up against. There are numerous types of malware that cause harm by stealing personal data, company’s confidential intellectual property or altering or deleting data.

But often CISOs and IT security operation teams are focusing on the visible ransomware threats and are trying to solve those with dedicated add-on products or modules to address the ransomware gap, in addition to their existing signature based anti-malware product. They are setting up a framework of dozens of interactive and stand-alone-modules.

Let’s compare it to the structure of a huge ship, like the Titanic. Deemed unsinkable due to its compartment separation design, the Titanic was eventually (and tragically) lost due to damage that was not focused on a specific area and that was able to bypass several security compartments (Read more...)

This is a Security Bloggers Network syndicated blog post authored by Sascha Dubbel. Read the original post at: Cylance Blog