Connect with us

Featured

Hacking has changed – and so must you

Published

on

According to F5 data that tracks the 25 largest security breaches between 2000 and 2015, an astounding 72 percent of today’s attacks target identities and applications, not the network.

The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology.  The Internet of Things (IoT) adds another layer of complexity in which applications are at the core of this changing landscape. According to F5 data that tracks the 25 largest security breaches between 2000 and 2015, an astounding 72 percent of today’s attacks target identities and applications, not the network.

This is according to Simon McCullough, major channel account manager at F5, who says, “This shift has come about because data is what hackers are after, and the most direct pathway to data is through user credentials and applications. In this complex and vulnerable environment, applications and corresponding data can be anywhere and everywhere.

“The traditional network perimeter has dissolved in this online, interconnected world, and so, in an attack on applications, traditional network firewalls are not enough of a defence. However, according to F5 research (specifically, marketing sizing estimates aggregated from global research firms), 90 percent of today’s IT security budget is spent on perimeter solutions, leaving minimal budget on protecting user identities and applications, where 72% of today’s attacks take place .”

McCullough says that in this new, borderless security landscape, it’s important to know your company’s threat profile. He clarifies, “In this regard, you need to understand the likelihood of exploitation at all of your network’s entry points – users, applications, data centres, and network infrastructure – and the resulting impact if these entry points get hacked. Your threat profile is a key element in determining that likelihood. Could your business be a target because of such factors, for example, as its geographic profile, industry, systems, software, or data?”

McCullough offers the following 10 useful focus areas to consider in order to help businesses strengthen their security programmes and risk mitigation strategies.

1. Understand the enemy

Although hackers today include less-skilled novices who are out to cause malicious chaos, as well as those who are driven by social and political agendas, the majority of today’s hackers are cybercriminals who are motivated by money. Although they have a reputation for sophisticated methodology, in fact, many of their methods are actually relatively unsophisticated, and they tend to take the path of least resistance, going after easy targets.

2. Sort out your cybersecurity budget properly, including cyber insurance

As outlined previously, applications and user identities form around 72 percent of today’s IT attacks, yet this is not generally reflected in IT budget allocations. Spend your security budget in the right way, and ensure that you have cyber insurance as part of your budget. Data breaches will cost you money, and insurance here is as necessary as household insurance for a homeowner facing the aftermath of theft.

3. Train all employees to understand that security is everyone’s responsibility  

Awareness training makes everyone more alert. Train your users to recognise and curtail factors such as spear phishing attempts and social engineering. Help them understand the importance of proper password management. Train developers in secure coding so that your web applications don’t have coding vulnerabilities.

4. Properly control access

·        Remember that access is a privilege. Strictly manage what your user identities are authorised to access, so that when an identity is compromised, a threat actor doesn’t have unlimited access within the network.

·        Manage your volume of user identities. Enable single sign-on to reduce the number of passwords that are stored insecurely or repeated across multiple critical systems.

·        Implement multifactor authentication (MFA) for accessing your network and applications, because identities get compromised and MFA will help to protect data from being breached in the event of user credentials being compromised.

·        Tighten up on username and password combinations: Don’t use weak or default combinations, and implement account lockouts after six failed login attempts. Also, implement stronger encryption methods on password databases.

5. Manage your vulnerabilities

·        Have a scanning solution for every network, system, and software type; don’t limit yourself to externally facing IPs.

·        Scan inside your network, and do black box and static code analysis of your apps. Layer your tools, because no single tool can universally find everything.

·        Scan, test, and scan again. Have a continual testing process aligned to your development cycles and patch releases of your vendors.

·        Implement a consolidated reporting platform that tracks all vulnerabilities by system and can produce valuable improvement metrics over time.

·        Prioritise web application vulnerability management. You can get extremely good guidance from the OWASP (Open Web Application Security Project) Top 10, which describes today’s most critical web application security risks and how to mitigate specific types of attacks.

·        Automate web application vulnerability management. Allow Web Application Firewalls (WAF) to patch a vulnerability automatically. A WAF requires routine attention by an experienced engineer. Many organisations are opting for managed WAF services versus hiring in-house expertise.

·        Patch everything monthly, including desktops, laptops and servers, and especially if you are running Windows. Don’t skip important patches, as they will ultimately be required later in a queue chain of dependencies.

·        Keep it updated: Don’t allow end-of-life software or hardware in your network.

·        Force updates to Adobe Flash, Oracle’s Java, and don’t allow old versions of Internet browsers to run on company computer assets.

6. Ensure you have the required visibility 

You can’t manage what you can’t see. It’s particularly important to make sure you have the visibility you need into your critical data. It’s important to properly architect, implement and continually manage intrusion detection/ prevention systems (IDS/ IPS), Security Information Event Managers (SIEM), data loss prevention (DLP) systems, and others. These systems need to have access to all parts of your network, systems, data, and data centres, and encrypted and non-encrypted traffic. Pay special attention to visibility within new virtualisation software.

7. Consider embracing the dark side… at least briefly

If you have an application that could cause significant harm to your business if it were compromised, it’s worth hiring an engineer to try to hack it. If hiring a hacker doesn’t sit comfortably, implement a public bounty programme.

8. Use the experts to help you

Compliance and incident response are two key areas for using the guidance of experts.

·        Security as a service is a great option for effectively managing high-risk controls that require immediate response by highly skilled engineers.

·        Test the effectiveness of your controls and control operators. Don’t let poorly designed controls or inadequate operators become the culprit.

·        Get help in the event of a breach. Get the professional experience you need after a breach so that they can make the important decisions that could have a material impact on the outcome of the incident.

9. Have a DDoS strategy

The DDoS attack landscape has shifted rapidly. No longer are complex, expensive attacks launched only at high-value targets. Today’s reality includes bots with plug-and-play attacks that criminals can rent at low cost, as well as IoT botnets that are easy to make and capable of launching terabyte-per-second attacks. Having a DDoS plan is critical.

10. Tell the ‘big shots’ about the likelihood and effect of a breach

Communicate the possibility and subsequent effect of a breach to your board of directors, senior management and others who need to be in the know. They need to be armed with this information rather than being hit with the reality of a breach that they never imagined. Properly done, this should also support your budget requests.

Anton Jacobsz, managing director at Networks Unlimited, a value-added distributor of F5 in Africa, concludes, “Few organisations today have the internal resources required to fight cyber threats on their own. They need intelligence from outside sources, and this is where the Networks Unlimited partnership with F5 can help. F5 was founded 20 years ago and understands applications and the network at the deepest levels. Together with its threat research and intelligence team, F5 Labs, the company works to provide the security community with threat intelligence about current cyber threats and future trends to help them stay abreast of the security landscape.”

Featured

Smart home arrives in SA

The smart home is no longer a distant vision confined to advanced economies, writes ARTHUR GOLDSTUCK.

Published

on

The smart home is a wonderful vision for controlling every aspect of one’s living environment via remote control, apps and sensors. But, because it is both complex and expensive, there has been little appetite for it in South Africa.

The two main routes for smart home installation are both fraught with peril – financial and technical.

The first is to call on a specialist installation company. Surprisingly, there are many in South Africa. Google “smart home” +”South Africa”, and thousands of results appear. The problem is that, because the industry is so new, few have built up solid track records and reputations. Costs vary wildly, few standards exist, and the cost of after-sales service will turn out to be more important than the upfront price.

The second route is to assemble the components of a smart home, and attempt self-installation. For the non-technical, this is often a non-starter. Not only does one need a fairly good knowledge of Wi-Fi configuration, but also a broad understanding of the Internet of Things (IoT) – the ability for devices to sense their environment, connect to each other, and share information.

The good news, though, is that it is getting easier and more cost effective all the time.

My first efforts in this direction started a few years ago with finding smart plugs on Amazon.com. These are power adaptors that turn regular sockets into “smart sockets” by adding Wi-Fi and an on-off switch, among other. A smart lightbulb was sourced from Gearbest in China. At the time, these were the cheapest and most basic elements for a starter smart home environment.

Via a smartphone app, the light could be switched on from the other side of the world. It sounds trivial and silly, but on such basic functions the future is slowly built.

Fast forward a year or two, and these components are available from hundreds of outlets, they have plummeted in cost, and the range of options is bewildering. That, of course, makes the quest even more bewildering. Who can be trusted for quality, fulfilment and after-sales support? Which products will be obsolete in the next year or two as technology advances even more rapidly?

These are some of the challenges that a leading South African technology distributor, Syntech, decided to address in adding smart home products to its portfolio. It selected LifeSmart, a global brand with proven expertise in both IoT and smart home products.

Equally significantly, LifeSmart combines IoT with artificial intelligence and machine learning, meaning that the devices “learn” the best ways of connecting, sharing and integrating new elements. Because they all fall under the same brand, they are designed to integrate with the LifeSmart app, which is available for Android and iOS phones, as well as Android TV.

Click here to read about how LifeSmart makes installing smart home devices easier.

Previous Page1 of 2

Continue Reading

Featured

Matrics must prepare for AI

Published

on

students writing a test

By Vian Chinner, CEO and founder of Xineoh.

Many in the matric class of 2018 are currently weighing up their options for the future. With the country’s high unemployment rate casting a shadow on their opportunities, these future jobseekers have been encouraged to look into which skills are required by the market, tailoring their occupational training to align with demand and thereby improving their chances of finding a job, writes Vian Chinner – a South African innovator, data scientist and CEO of the machine learning company specialising in consumer behaviour prediction, Xineoh.

With rapid innovation and development in the field of artificial intelligence (AI), all careers – including high-demand professions like engineers, teachers and electricians – will look significantly different in the years to come.

Notably, the third wave of internet connectivity, whereby our physical world begins to merge with that of the internet, is upon us. This is evident in how widespread AI is being implemented across industries as well as in our homes with the use of automation solutions and bots like Siri, Google Assistant, Alexa and Microsoft’s Cortana. So much data is collected from the physical world every day and AI makes sense of it all.

Not only do new industries related to technology like AI open new career paths, such as those specialising in data science, but it will also modify those which already exist. 

So, what should matriculants be considering when deciding what route to take?

For highly academic individuals, who are exceptionally strong in mathematics, data science is definitely the way to go. There is, and will continue to be, massive demand internationally as well as locally, with Element-AI noting that there are only between 0 and 100 data scientists in South Africa, with the true number being closer to 0.

In terms of getting a foot in the door to become a successful data scientist, practical experience, working with an AI-focused business, is essential. Students should consider getting an internship while they are studying or going straight into an internship, learning on the job and taking specialist online courses from institutions like Stanford University and MIT as they go.

This career path is, however, limited to the highly academic and mathematically gifted, but the technology is inevitably going to overlap with all other professions and so, those who are looking to begin their careers should take note of which skills will be in demand in future, versus which will be made redundant by AI.

In the next few years, technicians who are able to install and maintain new technology will be highly sought after. On the other hand, many entry level jobs will likely be taken care of by AI – from the slicing and dicing currently done by assistant chefs, to the laying of bricks by labourers in the building sector.

As a rule, students should be looking at the skills required for the job one step up from an entry level position and working towards developing these. Those training to be journalists, for instance, should work towards the skill level of an editor and a bookkeeping trainee, the role of financial consultant.

This also means that new workforce entrants should be prepared to walk into a more demanding role, with more responsibility, than perhaps previously anticipated and that the country’s education and training system should adapt to the shift in required skills.

The matric classes of 2018 have completed their schooling in the information age and we should be equipping them, and future generations, for the future market – AI is central to this.

Continue Reading

Trending

Copyright © 2018 World Wide Worx