Page 13 - index
P. 13
even have detailed steps to help users enable macros. Once the user opens the document, the
macro triggers the infection and allows malware into the system.
Employee training isn't enough to prevent malware infections
In the past, phishing emails were often comically amateur, written in broken English that most
people would recognize as being a scam (Nigerian prince emails come to mind). But today,
these emails are incredibly convincing, with very real-looking serial numbers and even
barcodes. The average employee with a rudimentary knowledge of cybersecurity is highly
unlikely to be able to spot a malicious email, no matter how well-trained he or she is.
Enterprise security teams need to recognize that there's no way to prevent every single
employee from opening every suspicious email that comes his or her way. Advanced security
tools can cover them where employee training can't by providing an active defense grid that
continuously monitors the endpoints and the network for threats and automatically neutralizes
them as they appear. Given how easy it is for malware to make it past the perimeter, security
teams need a way to get a forensic look inside their networks and protect the valuable data
within.
About the Author
Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions in March 2014. His
responsibilities include analyst relations, competitive and market intelligence, corporate visibility,
M&A, and strategic partnership development. Todd draws on his 17+ years of experience as an
equity research analyst where he covered the security industry for much of that time. In his
equity research career Todd provided research coverage of over 60 companies across several
technology sectors, including security, infrastructure software, data center/cloud hosting, and
healthcare IT.
Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog
Twitter: @hexis_cyber
LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
13 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide