sb-as logo
Story image

The new normal for digital security: inside information

Traditional perimeter guards are no longer enough to guarantee network security, with defences that rely on machine learning and analytics the way forward.

That’s according to Wynyard Group, who says cyber security is moving away from focussing on the perimeter and machine learning and analytics to detect and stop attacks as they occur.

While still wholly necessary as a first line of defence, traditional perimeter guards, such as firewalls, are no longer enough to guarantee a network cannot be breached, the security firm says in a company blogpost.

“The chances are your network will be hacked – and it probably already has been,” Wynyard says.

“Hackers have long since learned to scale those walls. Some hack for fun, some for money and some just hack to make a point; it’s not difficult.”

What is difficult is working out when it happened and how to minimise the damage, the company says.

“Many organisations are now locked in a constant game of cat and mouse between their defenders and potential invaders.”

Prevention better than a cure

Wynyard says many organisations unfortunately cannot avoid storing people’s personal data and running large networks of proprietary information to keep operations going.

“The security of that information is paramount, with its vast amounts of personal identification details that could be stolen to commit fraud and network activities that, if disrupted, could spell disaster,” it says.

“Organisations such as the U.S. government’s Office of Personnel Management, which has apparently been hit by several breaches and lost countless records from background checks on job applicants including 5.6 million people’s fingerprints, highlight the importance of not only trying to prevent hackers getting in but also spotting them once they do,” Wynyard says. “And kicking them out before they can take what they came for.”

Failing to spot a network breach and allowing criminals time inside a network to look around and copy, move or delete data is ultimately a far greater expense than efficient cyber-security will ever be, the company explains.

“TalkTalk in the UK suffered customer data losses that will cost the telco millions of pounds to remedy as it joins fellow hacked organisations in arranging 12 months’ free identity theft checks for affected customers and other potential remedies,” Wynard says. “The company was criticised for elementary cyber-security oversights.

“And in Australia, although a network breach at Kmart was relatively contained, the infiltration of such a big-name retailer catapulted cyber-security into the spotlight, underlining the fact that just about every organisation is at risk and the costs can be high.”

Increasing automated analytics

According to Wynyard, the cyber security market has a growing audience of organisations becoming increasingly aware that, in the case of network security breaches, it’s not a matter of if but when.

“More and more are keen to work out just what the latest defensive actions are in this new landscape,” the company explains.

“It can seem a huge task to monitor vast networks and flows of traffic so the best approach is automated analytics, to take the human stress out of the equation.” 

Wynyard says there have been several digital developments to help reduce the number of databases falling prey to hackers. Products such as Open Network Insight (ONI) are helping – ONI is an open-source tool that monitors operational and security threats in datacentres.

In turn, it relies on Enterprise Data Hub, a platform that can collate an organisation’s various data resources and store them together, enabling unified analytics and other value-adding activity to be performed more succinctly.

“The rising demand for more sophisticated techniques to counter the damage caused by network breaches has also seen the growth and continuing development of cyber threat analytics solutions,” Wynyard says.

“New and emerging cyber analytics offer a ‘behavioural intelligence’ approach. The software platforms work within an organisation’s network, learning its normal traffic and activity patterns then watching for anomalous incidents that could indicate a breach.”

The software flags any such suspicion to the IT security team for further investigation as soon as it is detected, says the company.

“Using analytics support platforms, such as Wynyard’s Advanced Cyber Threat Analytics (ACTA) offering, is becoming ever more prominent as a go-to solution for inevitable network security breaches.

“Looking for, and acting upon, the information already available within your own network is the new normal in information security. It is rapidly becoming a real-time answer to keeping reputational and financial damage to a minimum.”

Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Five Eyes nations want legal access to backdoors to fight 'illegal content'
The nations argue that encryption can make the enforcement of public safety difficult, particularly when it comes to serious problems like child exploitation. More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More