Page 27 - Cyber Defense eMagazine April 2021 Edition
P. 27

Limiting Damage Post-Breach

          It is important to attempt to contain the fallout as best as possible. One must, however, first assess the level
          of damage already done. Notify law enforcement if necessary, then engage in damage limitation. Limiting
          damage post-system breach can take shape through a number of strategies.


          These measures include rerouting network traffic, filtering the attack, and isolating network
          components. The approach will differ based on the type of attack. Isolating all parts of a
          compromised network can prevent the infection from spreading. Filtering or blocking is often used with deni-
          al-of-service attacks, such as ransomware attacks.


          If you find yourself in a ransomware attack, do not pay the ransom. One should be working against the cy-
          bercriminals, not with them. Work with law enforcement to discover the source of the attack and combat it.


          Future Protection Trends

          One trend to protect against data breaches is increasing the number of required security checks. This aims
          to decrease the chances of malware going unnoticed and corrupting data systems.


          Increased integration of AI is another current trend to improve protection against cybercrime. AI is better
          able (than humans) to efficiently check for vulnerabilities in systems. It is also able to discover and respond
          to cyberattacks in under a second. In the case of the SolarWinds attack, millions of employees didn’t even
          notice the attack for months.
          Future Industry Trends
          One key future industry trend is ‘cyber threat intelligence’. Cyber threat intelligence helps people increase
          their understanding of the typical behavior of a cybercriminal. This means that they are better able to react
          appropriately and timeously to attacks.

          An example of this is the institution of Cyber Fusion Centers, which takes a strategic approach to integrate
          technologies, processes, and teams.  Even so, there are significant challenges to
          operationalizing intelligence in such a way that prioritizes activities for cyber defenders.

          Businesses moving on to the ‘cloud’ is another popular trend in the industry. The popularity of this shift is well
          justified too. Using the cloud is far more efficient and more secure than traditional
          storage methods.


          Supply chain attacks are a rising threat, with a high potential for serious consequences. Defense strategies
          are integral to the survival and safety of any business. Having a water-tight data
          protection plan is wise, especially in this current climate of ever-increasing cyber threats.

























             27    Cyber Defense eMagazine – April 2021 Edition
                   Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   22   23   24   25   26   27   28   29   30   31   32