Sign In

Security analytics for cyber-fraud prevention

Almost every day, the news con­tains reports of busi­ness­es being com­pro­mised by cyber threats. Often, when intel­lec­tu­al prop­er­ty or cus­tomer infor­ma­tion is stolen dur­ing an attack, this data can be used to car­ry out, or assist in, fraud­u­lent activ­i­ties.

When this occurs, cus­tomers can accuse organ­i­sa­tions of inad­e­quate prepa­ra­tion and lack of care, and there can be sig­nif­i­cant cost and rep­u­ta­tion­al impact. When it comes to deal­ing with cyber inci­dents – whether an inten­tion­al or unin­ten­tion­al breach – it is impor­tant to be as pre­pared as pos­si­ble. But is this actu­al­ly the case in busi­ness­es today?

Research con­duct­ed by the Econ­o­mist Intel­li­gence Unit and spon­sored by Arbor Net­works has shown that near­ly three quar­ters of com­pa­nies don’t feel ful­ly pre­pared should a cyber inci­dent take place. The two top areas of con­cern are an organisation’s abil­i­ty to pre­dict the busi­ness impact of an inci­dent accu­rate­ly and their abil­i­ty actu­al­ly to detect an inci­dent with­in 24 hours of it occur­ring.

The same research also shows that organ­i­sa­tions are expe­ri­enc­ing more cyber-secu­ri­ty inci­dents now than in pre­vi­ous years and board-lev­el exec­u­tives are begin­ning to under­stand both the con­se­quences of a suc­cess­ful breach and the increas­ing like­li­hood that this will occur. Secu­ri­ty, risk and com­pli­ance should now be a con­cern for every­one with­in an organ­i­sa­tion, from board lev­el down.

So, how are busi­ness­es falling vic­tim to cyber attacks? Well, when it comes to secu­ri­ty, there are two types of organ­i­sa­tion: those that have already been tar­get­ed and those that will be tar­get­ed. In the past, some organ­i­sa­tions have sim­ply assumed that the worst will not hap­pen to them and just under two thirds of organ­i­sa­tions actu­al­ly have an inci­dent han­dling plan or team in place. This does appear to be on the rise though, which is encour­ag­ing.

Putting plans and train­ing in place is huge­ly impor­tant to an organisation’s abil­i­ty to respond. Peo­ple and process­es have a sig­nif­i­cant part to play; edu­cat­ing employ­ees on the types of threats that are out there and how to spot them can be extreme­ly help­ful. Reg­u­lar­ly exer­cis­ing inci­dent han­dling plans and teams is also cru­cial, but mul­ti­ple research reports have found this is often some­thing that is over­looked.

One key ques­tion that many ask is how do attack­ers actu­al­ly get through the defences organ­i­sa­tions have in place: are busi­ness­es sim­ply not tak­ing this seri­ous­ly enough? The issue here is that secur­ing a mod­ern net­work and ser­vice archi­tec­ture is not sim­ple. We all take for grant­ed our lap­tops, palm­tops, extranet access to busi­ness part­ners, cloud ser­vices, home-work­ing and so on, but all these things make it much more dif­fi­cult to ful­ly con­trol data and secu­ri­ty with­in an organ­i­sa­tion. And that is before you even start to con­sid­er the com­plex­i­ty and sophis­ti­ca­tion of the tools and tech­niques now avail­able to hack­ers.

Ana­lyt­ics solu­tions are becom­ing an increas­ing­ly impor­tant tool for inci­dent-han­dling teams

Peo­ple are a key weak point, with mediocre pass­words, phish­ing and water­ing hole-style attacks con­tin­u­ing to be suc­cess­ful in giv­ing attack­ers a foothold with­in busi­ness­es. Once an attack­er is inside they can often remain there unde­tect­ed for a lengthy peri­od. Organ­i­sa­tions have tra­di­tion­al­ly focused their secu­ri­ty on pre­vent­ing threats from enter­ing their net­works and the whole area of pre­ven­tion ver­sus detec­tion has become a hot top­ic with­in the secu­ri­ty indus­try.

Organ­i­sa­tions are now start­ing to look at how they can be quick­er in detect­ing threats that have made it inside their net­works and through their defences – as this is some­thing we should now expect. Tra­di­tion­al secu­ri­ty archi­tec­tures tend to involve lay­ered solu­tions at the organ­i­sa­tion perime­ter; once a threat has made it through this perime­ter many organ­i­sa­tions have very lim­it­ed threat detec­tion capa­bil­i­ties. Secu­ri­ty strate­gies are chang­ing though and expe­ri­ence is dri­ving organ­i­sa­tions to focus more on being able to detect and analyse threats that are already inside their net­works much more quick­ly.

One issue here is that the skills to analyse threats can also be in short sup­ply in many organ­i­sa­tions and lever­ag­ing spe­cial­ist ser­vices to aug­ment inter­nal resources is becom­ing increas­ing­ly com­mon. Solu­tion ven­dors are aware of this skills short­fall and have made tools avail­able that are more graph­i­cal in nature, few­er screens full of columns, rows and so on, mak­ing it eas­i­er for spe­cial­ists to spot trends as well as unusu­al or sus­pi­cious activ­i­ties over longer time frames.

Ana­lyt­ics solu­tions are becom­ing an increas­ing­ly impor­tant tool for inci­dent-han­dling teams. These solu­tions allow vis­i­bil­i­ty into net­work traf­fic and user activ­i­ties span­ning days, weeks and even months, and the best of these solu­tions allow the user to nav­i­gate through all this infor­ma­tion in real time. These solu­tions can dras­ti­cal­ly speed up both the iden­ti­fi­ca­tion of a prob­lem, its inves­ti­ga­tion and the res­o­lu­tion, min­imis­ing the impact to a busi­ness and reduc­ing the risk that attack­ers will make off with cus­tomer data or busi­ness intel­lec­tu­al prop­er­ty.

Cyber attacks are now a threat for all organ­i­sa­tion types and being pre­pared is key. Hav­ing the appro­pri­ate tech­ni­cal solu­tions, which make the most of avail­able resources, is impor­tant, but so is train­ing and process imple­men­ta­tion. Look­ing again at the research by Arbor Net­works and the Econ­o­mist Intel­li­gence Unit, two thirds of sur­veyed organ­i­sa­tions felt that being able to respond well to a secu­ri­ty inci­dent could actu­al­ly enhance their busi­ness rep­u­ta­tion – more than that though, being able to respond well is some­thing busi­ness­es owe to their cus­tomers.

For more infor­ma­tion please vis­it www.arbornetworks.com