Hacker and Malware Compromise: Why Do Some Organizations Get Hit, While Others Do Not?

by | Feb 21, 2020 | Data Security, Hacker Prevention, Intrusion Prevention, Malware, Network Security, Network Visibility, Role-based Access Control (RBAC)

Why us?”

This is the common question we hear every time we arrive on the scene to mitigate a network crippled by either a malware that made it into a system, or a hacker who snuck in to do a smash and grab. The answer is, as we have discussed before, that criminals are opportunists and they will be more than happy to steal the wallet of a poor man if it is easy. There may be less money in it, but since it is rare to find a commodities broker with a fat wallet obtainable by an easy bump-and-pull, criminals are always willing take what they can get. Criminals that are in the business of looting networks are no different. If a network has poor security, there is a criminal out there more than happy to see what they can get out of it.

To seal up and secure your network, take care of three important things:


Network Visibility

It is so important that you run a platform that gives your businesses the ability to see with clarity all the events and activities of the network. The old way of network management, relying only on firewalls and web gateways and sandboxes, do not provide visibility. Network administrators cannot detect the who, what, when, where and how an intrusion or infection occurred without cloud network security, such as Umbrella or Meraki. Without visibility, identification and mitigation is a major migraine. Having a network visibility platform has another advantage: it additionally allows the network administrator to expand the network while keeping it consistently visible and secure.

Graph compliments of Bi-Survey.com

Data Governance

The ability to set policies and protect who has access to what areas of a network is critical to data protection. Data governance software is able to remain on alert for any unusual activity, ready to isolate anything suspicious that strays from acceptable behavior. It allows the network administrator to Identify what users need access to what parts of the network and provide permissions accordingly, manage a policy system with ease, and reduce network complexity. In short, a data governance software creates more order over the system the network administrator needs to keep clean and safe.

Routine Network Assessment

Running a network assessment at regular intervals is a very important way to maintain the security of your network. A good network assessment will be able to assess who are the domain controllers, list all users of the system, detect time servers, mail servers, SQL servers and all major applications running. It can additionally identify if there are vulnerable passwords, find missing security updates, and show where there are gaps in security, detected by an external vulnerability scan.

If your company fails to have a visibility appliance, data governance software, and does not do routine network assessments, you are a business broadcasting your wish to be victimized. CyberCrime Magazine reports that 60% of small businesses go out of business when hit with a data breach.  We don’t want your business to be a part of that statistic. Because cyber criminals are running applications to find networks with these kinds of vulnerabilities, it is only a matter of time before any unsecured network is going to be hit.

Hybrid VDI - Total Economic Impact of VMWare End User Computing