Security is just increasing in size and concern and businesses are going through a new level of evolution in the cyber security model, according to Cisco advanced threats security solutions architecture team director, Paul Davis.
“We’re seeing a rise in the number of breaches, the visibility of the breaches and the attacks are getting more and more sophisticated. We’re seeing more targeted attacks, custom malware and if you, as a business have multiple systems, it’s going to be hard to control.
“Or if you have multiple tools for these systems, they might not communicate with each other. The more systems you upload, the more you have to keep checking and it just gets complicated,” he indicated.
Davis claimed some common threats lurk in emails and on the Web, and ransomware, in addition to targeted attacks using sophisticated tools and social engineering activities. As such, Davis claimed that security is the hidden secret of Cisco, with its threat intelligence and malware analysis tools.
“Security is a reinvigorated focus for the company because the network is like the nervous system of an organisation and everything flows through that network. But nowadays, we have to make sure it’s secure.
“We need to reduce the overhead of responding to incidents. Businesses need to be able to leverage the information across the infrastructure so that integration and connectivity is becoming more apparent,” he said.
According to Davis, businesses that want to keep moving forward in their digitisation, while still guaranteeing a high level of security and prevent cybercrime need to change their approach to cyber threat defence strategies.
He claimed there are three phases to the methodology for structuring defences. He said the first, is to detect the known attacks.
“You need to block these before they can even get near your infrastructure to cause any problems. Of course, there is anti-virus but that has to be more agile and faster. That leaves businesses dealing with just the unknown.”
Davis mentioned the second wave is dealing with the unknown threats. He indicated that in the past, it was expensive to do just that but now, with technology advancements, it has become easier and cheaper to do.
“In the past, dealing with visualisations and databases, and inverting network traffic, for example, was expensive. That world has changed now. I call this the During Model as you need the tools to detect these threats during the point where it tries to get into your systems,” he said.
The last phase Davis brought up is thee containment of the attacks. He stressed the importance of migrating advanced threats through the use of an integrated cyber threat defence strategy.
“You need to have the bigger context of seeing if there’s anything out there that matches the attacks you’ve detected and enforce that detection capability across the entire infrastructure. So, in a nutshell, businesses need to start preparing for the unknown,” he added.