sb-as logo
Story image

The key to deterring cyber crims? Make an attack not worth their time

When it comes to protecting against cyber attacks, it's important for organisations to take note of their vulnerabilities and take steps to make it expensive and difficult for hackers to target them.

This is according to Palo Alto Networks, who says as long as the cost of perpetrating a cyber attack remains low, and attackers continue to reap rewards, companies and individuals will remain at risk. 

The evolving cyber threat landscape puts large, high-profile organisations at risk of data breach, and risks individuals’ growing digital lifestyles. Despite their prevalence, there are steps that can be taken to minimise the threat of cyber attacks, Palo Alto says.

Sean Duca, CSO of Asia Pacific at Palo Alto Networks, says, “As long as there is financial gain to be made from attacking companies and individuals, hackers will continue to find new ways to breach defences.

“However, if we can increase the cost of a successful attack by forcing hackers to create new, unique methods every time they attempt to breach a system, the number of attacks is likely to decline. A preventative stance, combined with next-generation technology and processes, can help to make successful attacks much harder for hackers to achieve.” 

Palo Alto Networks has identified three key factors that could make cyber attacks less financially-viable for hackers and therefore reduce successful attacks: 

1. Technology

Advanced cyber security technology can monitor the network and respond automatically to new threats. Such technology includes dynamic systems that are analytical, predictive, and informed by global threat data. 

2. Processes 

Human error and lack of security training makes it easier for hackers to be successful. The right combination of processes can make employees more efficient at managing risks, using training and other internal education strategies to minimise human error. 

3. Information 

Making an effort to share information as a community can help organisations educate themselves about the evolving threat landscape and respond to new attacks faster than they could otherwise. By sharing information, the industry can build up a network of defence. 

Story image
Attivo Networks raises the stakes against 'Ransomware 2.0'
“Advanced human-controlled ransomware can evade endpoint security controls and after initial compromise, move laterally to cause maximum damage, do data exfiltration and encrypt data."More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Story image
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. More
Story image
Device authentication services to reach $8.4 billion by 2026 in response to IoT cybersecurity
"There are several key technologies revolving around authentication security that currently transform the IoT device value chain."More
Story image
Rackspace and Cloudflare join forces for managed edge security
Rackspace and Cloudflare join forces for managed edge security The solution includes a web application firewall, DDoS protection, DNS services and a global content delivery network, backed by 24/7 support.More
Story image
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing. More