Turning the Tables on Hackers with MDR

With the number of cyber breaches you hear about in the news, it’s easy to get disheartened and frightened.  Rightfully so! I, however, remain optimistic, and here’s why: with the advent of the change in strategy the industry is taking, the playing field is being leveled in favor of the good guys. Allow me to explain by walking you through the development of this industry, what it meant for administrators, and for hackers… and why that has all changed now.

The first very cybersecurity controls entailed organizations allowing and denying traffic into their network through the router/gateway. As networks evolved and the quantity of data and connected devices proliferated exponentially, there was a dire need for organizations to “keep bad guys out” of their network.  The costs of security breaches were simply too high.

Cybersecurity evolved in a linear fashion at first.  Technologies, processes, and controls were created to allow good traffic in and stop bad traffic.  Firewalls, antivirus, email security, web security, IPS, and other sub-categories emerged within cybersecurity.  Security professionals were preaching a “defense-at-depth” strategy where organizations would have security controls at the endpoints, the network edge, and the data-centre, to attempt and block potential breaches.

For a hacker, the goal was (relatively) simplistic: penetrate JUST ONE of these controls, and you own the network.  If you are able to breach just one unpatched server, compromise one overlooked/un-updated laptop, send one successful phishing email, you were in.  In fact, once inside the network, lateral movement was quite easy and could be done without being seen by network administrators.

In other words, to protect a corporate network, administrators had to be right at every single juncture on their network, and they had to be right 100% of the time, ALL the time. (Read more...)

*** This is a Security Bloggers Network syndicated blog from IntelliGO MDR Blog authored by Effi Lipsman. Read the original post at: https://www.intelligonetworks.com/blog/turning-the-tables-on-hackers