The Intel vPro? Platform Enterprise for Windows with Built-in Intel? Hardware Shield Can Detect and Mitigate the Threat of Ransomware
Chuck Brooks
Named "Top Tech Person To Follow" by LinkedIn, Voted "Cybersecurity Person of the Year" Cited Top 10 Global Tech & Cyber Expert & Influencer, Georgetown U Prof, 2X Presidential Appointee, FORBES Writer, 123k LI Followers
In the past few years, the deployment of ransomware has become a preferred method of cyber-attack by hackers. Most ransomware breaches begin with a phishing email or through a Remote Desktop Protocol (RDP) compromise. The rise in attacks is the result of the transformation to remote work and because many business networks and users do not use secure browsing practices. Many targeted businesses often lack the in-house cybersecurity expertise, understanding of the threats, and do not have many of the security tools necessary to help thwart attacks.
One of the biggest factors in the growth of ransomware is the advent of crypto currencies that allow criminal hackers to get paid in currencies that are difficult for law enforcement to trace.
Statistics tell the alarming story. ?According to the 2022 SonicWall Cyber Threat Report, during 2021 there were over 623 million ransomware attacks constituting a triple-digit (105%) growth in ransomware from the year before. In 2022, ransomware attacks are still trending at alarming numbers. ?2022 SonicWall Cyber Threat Report | Threat Intelligence (click “read more” under Key Findings 02 Ransomware”)
Businesses are not defenseless against ransomware. ?Cyber hygiene, patching, and other actions can help mitigate the spread of malware. However, it is clearly not enough as too many breaches are occurring. The reality is that cyber-defenses need to be more holistic and multi-layered in covering all the vulnerabilities. A key element of that approach to closing those gaps is utilizing the hardware enabled cybersecurity capabilities derived from a fortified business PC platform.
?Intel? Hardware Shield?and Threat Detection Technology for Enterprise Window devices
While there are many good endpoint detection response (EDR) software solutions for threat detection, they often can be circumvented. EDR working in conjunction with a hardware-based platform are much more difficult for hackers to instigate malicious attacks, including ransomware. Software alone is not enough but software and hardware working in tandem are a cybersecurity force.
If you cannot detect you cannot mitigate cyber-threats. Hardware-based systems help protect endpoints by identifying threats that are not visible to EDR software tools. The CPU threat detection featured in?Intel? Hardware Shield? for Enterprise Window devices does this by examining all the layers above it so it can catch many zero-day threat derivatives and malware cloaking techniques often used by hackers.
Simply said, the Intel vPro? platform, hardware security detection features work to close gaps and help identify malicious code on endpoints, identify malware, and ransomware threats that can be missed by software-based network security solutions.
From a cybersecurity perspective, especially when addressing ransomware concerns, the Intel vPro? platform?is necessary for any business. It has much more than malware and ransomware detection capabilities. The built-in?Intel? Hardware Shield for Enterprise Window devices delivers integrated hardware-based PC protection, which includes below-the-OS security, application and data protection, and advanced threat detection.
It is comprehensive and automated. ?“The Intel? Hardware Shield’s for Enterprise Window devices below-the-operating-system capabilities support a secure boot, allowing computers to launch in a trusted state. Dynamic Root of Trust for Measurement (DRTM), a built-in feature of Intel? Hardware Shield for Enterprise Window devices, provides hardware-to-software security visibility for the operating system and an additional layer of protection against firmware attacks. At the application and data layer, Intel? Hardware Shield for Enterprise Window Devices helps prevent memory corruption, tampering attacks, and cold boot attacks, in the event of a stolen system.” Small Business Network Security Tips - Intel
How does the Intel? Threat Detection Technology work? It uses a combination of CPU telemetry and ML heuristics to detect attack-behavior. It can detect ransomware, crypto jacking, and other threats that leave a footprint on the Intel CPU performance monitoring unit (PMU).
领英推荐
Other layers of hardware-based security features offered by ?Intel? Hardware Shield?for Enterprise Window devices include:
·????????Hardware virtualizations?that enable OS isolation and protection of critical data and code, thereby helping to limit damage caused by malware.
·????????Hardware protected boot process?that helps to prevent rootkit attacks by ensuring only trustworthy firmware and OS images are loaded.
·????????Hardware-based total memory encryption?that helps prevent malicious data retrieval from a stolen device.
·????????Hardware-assisted device manageability?capabilities that deliver in/out-of-band management to aid fast remote device recovery.
·????????Hardware-enhanced multifactor authentication?that helps prevent phishing attacks.
For more operational specifics see: Small Business Network Security Tips - Intel
?Ransomware is not a new threat, but it can be a devastating one for any type of business large or small. Businesses need to be prepared and equipped with the best cybersecurity tools. ?Intel? Hardware Shield?and the Intel? Threat Detection Technology (Intel? TDT) need to be an integral part of any anti-ransomware tool kit. The exciting news is that it and all the features for both security and performance come built-in with the Intel vPro? Platform for Enterprise Window devices. ?That platform cyber fortifies your PC to detect and protect against ransomware and is important for any business that wants to help avoid being breached.
This article was sponsored by Intel and written by Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.?
OT Cyber Security Management
2 年It would be amazing to see how this pans out and if Intel has figured out some of the fundamental issues with hardware security issues that the SEV stumbled into after several trials. Like lack of encryption on the general registers, non-authenticated memory access and VM control blocks manipulation. Thanks, Chuck for sharing.
#StandWithUkraine | Multiple Times Best-selling Author. Keynote Speaker. Top 50 Global Thought Leader & Influencer on Cybersecurity, Marketing, Startups, EdTech by Thinkers360. Founder & CEO, dacybersecurity.com
2 年65 Shares in 4 hours!!! ?? Seems I need to read it too. Keep up the great work, Chuck Brooks!
Green/Sustainability Entrepreneur, Partner working to make a difference in our Community, on our Planet
2 年Thanks for sharing. The vPro chip has long been underutilized. Asset management has always been the core, though most never “turned it on”. Advancing to address randsomware is a strong and natural progression.
?? Author | Director, Cyber Security Leader with exposure to 35+ Countries including US, UK, Europe, Australia | Risk and Compliance | Cloud Security| PCI DSS | ISO 27001 |ISO 22301 | Security Architect | 25000+ Follows
2 年Amazing! Thanks for sharing valuable information Chuck Brooks !
Generative Ai, Ethical Ai, Ai Trust, Risk & Security Management, Real-Time Platforms, Ecosystems, Cybersecurity, Data Centers, Power, Strategic Planning, Global Thought Leadership, Collaboration, Emerging Technology
2 年Excellent, thank you #ChuckBrooks once again, will share