Don’t Bring a Sword to a Gun Fight
As companies continue to splurge on cybersecurity, hackers enjoy record levels of success

Don’t Bring a Sword to a Gun Fight

As companies continue to splurge on cybersecurity,?hackers?enjoy?record levels of success. ??

There’s a?famous?scene in?Raiders?of the Lost Ark?when Indiana Jones?is battling his way through a crowded village in hostile territory.?As Indy?makes his?way to safety, the sea of people parts and?out?from?the crowd emerges?a?master?swordsman?dressed in?all?black from head to toe.?

To capture Indy’s attention and show off how well he can use a sword, he twirls his giant?weapon?up?and?down?and?side?to side?in a menacing display of pre-fight bravado. Unimpressed, Indy rolls his eyes, calmly removes a pistol from his belt and fires?a single?shot at the swordsman. In one second, the fight is over.??

“Companies are building giant walls in front of their house as hackers casually walk in through the unlocked back?door (smirking just like Indy did at the swordsman).”?

Unfortunately, in the ongoing fight between companies trying to protect their?network?from hackers trying to breach?it, there is growing evidence that companies are?unwittingly?playing the role?of the swordsman.?Measures taken by companies?to secure their network and improve cybersecurity are?flashy?and?sound good on paper—but they?don’t seem to be?that effective at?keeping?hackers out.?

According to the recently published?State of Cyber Security Resilience 2021?study,?82%?of?companies?increased their cybersecurity spending?in the last year. Yet, at the same time,?successful breaches from hackers increased by 31%?from the previous year.???

“When you put up a big wall in our environment, the back?door isn’t left unlocked…because?it’s not there?in the first place.?There is no back door.”?

The Shift to Remote Work?is a Scapegoat—the Real Problem is Fragmentation??

The shift to remote work is often cited as a reason for the increase in cyber-attacks against corporations.??

It’s true, protecting the integrity of your network?is hard enough when?all?your?employees are working?side-by-side?in an office on company-issued devices.?And yes, the?recent?shift to remote work?means?there are more opportunities for?your employees?to store corporate data?on their personal devices.?If employees do not properly manage security controls on their own device,?this "authorized" endpoint can be compromised and provide access to the corporate network.??

But your employees were storing company data on their personal devices before the pandemic. It was a?problem?then, and it’s a?problem?now.?The shift to remote work?just served to?put a giant spotlight on?it.??

And that’s the point.?At?TetherView, we?believe?the?IT challenges?of managing?and supporting?a remote workforce?highlight?a much bigger?and fundamental?issue?with how most companies structure their IT environment—everything is?fragmented.?Information technology maintenance, threat monitoring and cloud services?cannot effectively work together to stop cyberattacks if they operate independently of one another.?IT sprawl means there are multiple entry points for hackers and more potential areas of vulnerability.?

One Way In. One Way Out.?

We have many mottos at?TetherView. For the?topic?of IT fragmentation, the answer is simple.?One way in. One way out.?Networks should be run in a zero-trust environment?that provides visibility into?everything?and only provides your employees (and the bad guys) with one way into your network…and one way out.?When you put up a big wall in our environment, the backdoor isn’t left unlocked…because it’s not there in the first place.??

Consider how this approach improves security around email, one of the main?points?hackers use to?enter?your network.?In a zero-trust environment, to protect users from potentially malicious websites,?all links in emails are sanitized using a sandbox server. The user cannot access the link directly. This mitigates attacks on personal devices by conducting analysis on the server side and injecting the results into the email.??

Introducing a zero-trust environment to your IT infrastructure supercharges the other things you are doing to enhance your cybersecurity.?A “before and after” with our clients shows that security measures they had in place?before?our partnership were?70% less effective.?Hackers are becoming more resourceful and?finding new ways to carry out their attacks.?It’s time for companies to introduce security solutions that help level the playing field.??

?

In other words, don’t bring a sword to a gun fight.??


Great article, Michael!??

要查看或添加评论,请登录

Michael Abboud的更多文章

  • The Silent Killer

    The Silent Killer

    Corruption: The Silent Killer of Innovation In the fast-paced world of business and technology, innovation is often…

  • Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    As the Executive Sponsor of a Columbia University Graduate Capstone team, I am thrilled to share the culmination of an…

    5 条评论
  • Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    The Power of Imagination in the Age of AI In the rapidly evolving landscape of artificial intelligence, the balance of…

  • Is Log4J even worse than you think? Probably…

    Is Log4J even worse than you think? Probably…

    The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s…

  • How to Make Your Office 365 Email More Secure

    How to Make Your Office 365 Email More Secure

    4 easy steps to enhance the security of your company’s email Email remains the primary point of entry for hackers…

    1 条评论
  • The Verkada "Hack" Was Not A Hack

    The Verkada "Hack" Was Not A Hack

    "With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to…

  • VPNs are jeopardizing the security of your business

    VPNs are jeopardizing the security of your business

    The Risk. The issue with corporate VPNs is that while they protect data traveling between a personal computer and a…

  • Don’t get burned by your WFH strategy

    Don’t get burned by your WFH strategy

    For most CEOs the possibility of a pandemic was lower on the list than a zombie apocalypse. According to a report on…

  • Fire the "IT Guy"

    Fire the "IT Guy"

    The title to this blog is not going to make any of us at TetherView popular with IT Managers. However, we think it’s…

    1 条评论
  • Compliance is NOT Security

    Compliance is NOT Security

    When we’ve met with organizations after a breach, there’s one thing we hear time and time again from the companies that…

社区洞察

其他会员也浏览了