Cyber Savvy Broker Newsletter: April 2024
?? Welcome back to the Cyber Savvy Broker Newsletter. Every month, we use this space to explore new and relevant topics for brokers in the cyber insurance world.
Modern businesses rely on boundary devices to protect their networks and data against cyber threats. These devices (VPNs, firewalls, routers, etc.) serve as the gatekeepers of business networks, monitoring the flow of inbound and outbound traffic. But as the first line of defense, boundary devices are also prime targets for cyber attacks.
In the first quarter of 2024, we witnessed the emergence of new critical vulnerabilities impacting virtual private network (VPN) devices from Ivanti and Fortinet, along with previously disclosed vulnerabilities impacting SonicWall firewall devices. Vulnerabilities in boundary devices can lead to unauthorized access, data breaches, and service disruptions.
Boundary devices are a double-edged sword for businesses: The technology that helps mitigate the risk of cyber threats and enables things like secure remote access, data protection, and regulatory compliance can also be specifically targeted in cyber attacks.
Most businesses use some sort of boundary device, which means brokers have an opportunity to educate their clients on how this technology can create cyber risk. To help guide conversations, we asked our experts about the pros and cons of boundary devices, strategies for addressing vulnerabilities in these devices, configuration tips, technology alternatives, and more.
Reimagining the modern network
When you picture a network, do you see an office with computers linked together by routers, connected to a data center, and protected with firewalls? This was once the standard, but advancements in cloud and mobile computing, alongside the rise of remote work, have forced us to reimagine what a computer network means to most businesses.?
Many modern businesses operate in a hybrid model with a mix of on-premise resources, cloud and mobile applications, and third-party infrastructure. In fact, some businesses were “born in the cloud” with little to no on-premise technology.?
This new reality can increase productivity and efficiency. When done correctly, it can even improve security. Yet, many businesses continue to rely on traditional networking boundary devices for remote access, connectivity, and security, making them critically important.
Benefits afforded by boundary devices
Acknowledging that boundary devices come with tradeoffs, let’s start with the positives. Here are some of the clear benefits afforded by VPNs, firewalls, and other comparable technologies.
Remote work and global operations: Boundary devices are essential for distributed workforces. VPNs enable secure remote access, allowing employees to work from anywhere while ensuring data is encrypted and protected from interception.
Data security and privacy: Businesses that transmit sensitive data over the internet need strong security controls to protect them from cyber threats. VPNs encrypt data in transit, making it unreadable to unauthorized users, while firewalls act as a barrier between secure internal networks and untrusted external networks by monitoring and controlling traffic.
Regulatory compliance: Businesses in select industries may be subject to strict regulatory requirements regarding data protection and privacy. Boundary devices can help ensure compliance with these regulations by securing data and mitigating the risk of breaches.
Furthermore, boundary devices are usually more cost-effective than physical security measures because they leverage existing internet infrastructure to create secure, private networks. They can also optimize network performance and provide administrators with tools to manage traffic and bandwidth effectively.
Associated risk of boundary devices
The benefits of boundary devices are undeniable, but they come at a cost. The vulnerabilities within the devices can create gateways for threat actors to bypass authentication checks, run arbitrary code or commands, trigger denial-of-service (DoS) attacks, carry out cyber extortion, or use the client network to perpetrate more attacks.
“The value of boundary devices is well-understood, but we all think about them in different ways,” said Scott Walsh , Principal Security Researcher at Coalition. “Businesses view these devices as a way to enable productivity, while threat actors see them as a portal to unfettered access. As a cyber insurance provider, we consider them in terms of overall cyber risk, especially devices with a history of critical vulnerabilities.”
Zero-day vulnerabilities in boundary devices are particularly concerning because they can be exploited before developers have the opportunity to release a fix, as we saw with the Ivanti VPN zero-day vulnerability in January. Coalition honeypot data showed a spike in traffic scanning for Ivanti devices seven days before the vulnerability was disclosed.
“Exploitation of boundary devices is not a new phenomenon, but these exploits seem to be happening more frequently,” said Jason Vitale , Incident Response Lead at Coalition Incident Response* (CIR). “The devices that are being targeted are very popular, which makes sense because threat actors tend to gravitate toward those with higher usage.”
The critical vulnerabilities targeting these devices aren’t necessarily new, either. In January, security researchers discovered two previously disclosed vulnerabilities impacting more than 178,000 SonicWall firewall devices. The vulnerabilities, which enable a DoS attack, date as far back as March 2022 and require firmware patching for remediation — a crucial yet complicated component of every cyber risk mitigation strategy.
领英推荐
Strategies for vendor advisories and patching
Whether a vulnerability impacts a boundary device or another technology, the most important thing we stress to policyholders is that they need to be highly responsive to security alerts. In this case, that means proactively engaging with their technology vendors.?
“If a business has a SonicWall device, they should be on the SonicWall email list,” said Vitale. “These vendors publish advisories and share important information, so it’s critical that businesses pay attention when they receive an alert.”
As a best practice, Coalition recommends that all businesses sign up for alerts from their technology vendors, given the critical role boundary devices play in perimeter defense. However, staying informed about new vulnerabilities is only half the battle — businesses must also be quick to act.
Timely patching of all software and firmware can help businesses significantly reduce the likelihood of an attack. In fact, policyholders with one unresolved critical vulnerability of any kind were found to be 33% more likely to experience a cyber claim.
Establishing a regular patch cadence is a smart risk management strategy, though businesses must also get comfortable deviating from that cadence in certain situations.
“If a critical patch comes out on a Tuesday, but the patch schedule isn’t planned until Friday after hours, don’t risk it,” said Vitale. “We’ve seen instances where businesses knew of a vulnerability and were planning to patch but experienced an attack because they waited until it was most convenient.”
Configuration tips for boundary devices
In addition to promptly patching technologies with known vulnerabilities, businesses can configure their boundary devices to reduce the chances of a cyber attack. Here are five?simple configuration tips from CIR:
Remember: These configuration tips may seem disruptive or inconvenient, but that’s often the price to pay for stronger cybersecurity controls and greater peace of mind.
Alternatives to boundary devices
Businesses looking to elevate their approach to remote access and network security should consider the secure access service edge (SASE) model. It’s an emerging cloud-based architecture that integrates security into applications and networking functions to help businesses avoid critical vulnerabilities, especially those affecting boundary devices.
SASE uses a software-defined wide-area network (SD-WAN) to connect offices and remote users to software resources. It bypasses many of the reasons why a business would use a firewall or VPN, centralizing network access to a unified platform and making it easier to implement security policies and manage security controls.?
“In a perfect world, we would recommend that businesses move to a SASE technology model due to the level of security it provides,” said Amy Cohagan , Senior Incident Response Analyst at CIR. “That said, SASE does come with an upfront investment in time and resources, so we know not every business can afford to do that.”
Talking to your clients about boundary devices
Truth be told, boundary devices aren’t going away anytime soon. While we expect the technology to get phased out and eventually move to the cloud, boundary devices remain indispensable in our remote-first world. Coalition recommends using these key insights to guide conversations with your clients:
Interested in diving deeper into boundary devices and cyber risk? Join us on Wednesday, April 24, at 10 a.m. PT / 1 p.m. ET for Coalition's live 2024 Cyber Claims Report webinar. Get a first look at the latest cyber trends and discover which popular boundary devices are more likely to lead a cyber claim.
Thanks for reading the Cyber Savvy Broker Newsletter. Join us for future editions as we continue to explore the most up-to-date and noteworthy topics in the cyber insurance industry. Click the Subscribe button to receive the Cyber Savvy Newsletter directly in your inbox.
Want to start working with Coalition? Click here to become an appointed broker.
*Coalition Incident Response is an affiliate firm made available to all policyholders via panel selection.
This communication is not a proposal of insurance. This communication is designed to provide general information on the topic presented and is not intended to construe or the rendering of legal or other professional services of any kind. If legal or other professional advice is required, the services of a professional should be sought. The views and opinions expressed as part of this communication do not necessarily state or reflect those of Coalition. Neither Coalition nor any of its employees make any warranty of any kind, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. Any action you take upon the information contained herein is strictly at your own risk. Coalition will not be liable for any losses and damages in connection with your use or reliance upon the information.?