What Happens When The Cyber Alarms Don’t Work?

What Happens When The Cyber Alarms Don’t Work?

Over half of all organizations assume that their IT networks have been penetrated, or will be in the future. The number of IT professionals admitting that they really don’t have complete control over sensitive systems and data is increasing each year.

The First Line of Defense Has Already Fallen

Perimeter detection is the first line of defense against any attack, whether it be physical, think an alarm going off when security in your home is breached, or an ATM blocking your back card if there have been too many incorrect PIN entries. The issue currently facing many IT experts, security analysts and information security professionals is that there has previously been an over reliance on perimeter detection as the ONLY line of defense. Not only are cyber-attacks completely bypassing perimeter detection, a recent survey reported that up to 30% of all security breaches never triggered the virtual alarms, but that preventative discovery is close to non-existent in many organizations.

What is even more alarming is what happens after a security breach.cyber bypass detection

The speed with which an organization reacts after a breach is vital in not only securing sensitive information but in examining and investigating exactly what happened, finding the compromised end-points and determining the full data risk impact as fast as possible. The problem is that most organizations are reactive instead of proactively aggressive in their search for potential threats at all times. In the same survey, it was noted that up to 25% of IT security professionals were notified of data breaches and cyber-attacks by a 3rd party. By then it could be too late.
Figuring out what happened after the fact is essential. Yes. Creating a secure environment that STOPS attacks is even more vital. To do that security professionals need to be vigilant, proactive and relentless in their hunt for cyber threats before they become cyber casualties of war.

Cyber ‘War’ Games Highlight Vital Security Flaws

Cyber ‘War’ Games Highlight Vital Security Flaws

There is a reason that the military conducts repeated simulated training exercises: To ensure that the armed forces will be able to respond to military attacks immediately and effectively. Little wonder then that governments around the world have been doing the same when it comes to a nation’s cyber security. Interestingly, that while the threat of a physical invasion of any western country decreases each year, the threat of cyber-attacks, increases dramatically. A cyber-attack has the potential to decimate many countries’ vital systems including transport, infrastructure (power, water, banking, and healthcare) and ‘cyber war games’ help governments plan against attacks, increase security and lower the chance of complete decimation.

The Cyber Storm – 2006 War Games Begin

One of the earliest tactical training exercises and simulated ‘war games’ was called ‘Cyber Storm’ which took place over the course of a week in February 2006. It was the first ever cyber security exercise to take place and enabled the Department of Homeland Security to prepare for future attacks by highlighting vulnerabilities and weaknesses not only in electronic systems, but in their response to an attack.

Cyber Storm – Attacks on All Fronts

One of the principal objectives was to ascertain the preparedness and response times of different systems and departments to an attack on all fronts. The simulation sought to disrupt key targets, and thwart the government’s ability to respond. Unfortunately it was successful.
The controlled and simulated attack was leveraged against key targets around the world including Washington DC’s metro transport system, hazardous materials in Philadelphia, Chicago and on London’s Underground. People on ‘no-fly’ lists appearing at several airports across the US, utility disruption in Los Angeles and planes flying too close to strategic targets.
The outcome of the exercise highlighted the inability of systems and departments to connect attacks fast enough and not being able to focus on the entirety of the attack, but rather on specific incidences. Overall it was found that, if under cyber-attack, the US may not be able to adequately defend itself fast enough.