• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Businesses need to be more aggressive with their cyber security, Cisco warns

You are here: Home / General Cyber Security News / Businesses need to be more aggressive with their cyber security, Cisco warns
June 15, 2022

Abstract image of a skull inside computer code

Companies have been advised to be a lot more “aggressive” with their strategy to proscribing network obtain to devices in the wake of the cyber war among Ukraine and Russia.

Governments have released several advisories warning corporations of the elevated risk of spillover cyber attacks from the ongoing cyber war. Getting intense with security can assistance hold out adversaries that are now scanning organizations for weak details that have network obtain, Cisco’s authorities reported at Cisco Dwell 2022.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Much too lots of firms are enabling old and disused items these kinds of as collaboration software package to retain entry to the network and exploiting these can guide to organisation-broad cyber attacks, they mentioned.

An “aggressive” tactic would also include the blocking of an entire origin network when malicious website traffic is detected, relatively than just the particular IP tackle from which it was despatched.

“You have utilities that you will not use on your network block you you should not need them to be there,” claimed Nick Biasini, head of outreach at Cisco Talos. “These are the kinds of points that we frequently see adversaries executing and it definitely, definitely would make a change if you go previously mentioned and past. [Cisco] can’t be that intense, but you unquestionably can, so remember to do so.”

Governments have been warning of spillover attacks from the cyber war involving Russia and Ukraine. The NCSC unveiled at CyberUK in May well that the Russian attack on Viasat was an unplanned by-solution of endeavours from Ukraine, and the US’ equivalent cyber authority CISA has also issued warnings to unprotected organisations.

Biasini added that organizations must stay clear of applying ‘out-of-the-box’ default protections and be much more stringent in what gadgets and programs are allowed on to the network.

JJ Cummings, running principal at the danger intelligence and interdiction crew at Cisco, mentioned organizations however want to be aggressive with the basic principles of cyber security far too, which are not at this time currently being applied throughout the board.

Multi-factor authentication (MFA) products and solutions “make a massive difference” in avoiding attacks like information breaches, he mentioned, though doing the ‘boring’ responsibilities like manually monitoring logs are also crucial for maintaining visibility above a corporate network.

He claimed that committing to carrying out the important, but time-consuming responsibilities, “is a matter that has to continue” to maintain businesses harmless from cyber threats. If a small business cannot afford to invest in an endpoint detection and reaction (EDR) solution, then log auditing really should be a fundamental aspect of their security.

“In some situations, in the larger corporations, I assume which is wherever the sexiness factor will come in,” he stated. “We just want to do the exciting things… we want to build a threat intelligence programme since that is what everybody’s carrying out these days. So, I feel there’s just not enough concentrate on individuals fundamental programmes.”

One more normally ignored shortcoming of businesses is the lousy servicing of institutional memory, the authorities claimed. Several organizations are not maintaining up-to-date documentation and leaving awareness with just just one human being in the IT workforce who, when they go away the corporation, normally takes that vital info with them.

“I applied to be a defence contractor, [and] when I remaining it was about two a long time afterwards, they actually attained out to me and claimed ‘how can we do this, this, and this?’ and I mentioned, effectively, what about the documentation I still left? ‘Oh, that was you, oh, we shredded that’. Fantabulous,” said Dave Lewis, world advisory CISO at Cisco.

“There’s so a great deal institutional information that just lives in people’s heads in security organisations and that that is not a very good place to be when they depart,” explained Biasini. “It’s just dropped.”


Some sections of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «new zloader malware technique makes it harder to spot phishing The rise of phishing as a service (PhaaS) and how to tackle it
Next Post: Microsoft’s Final Patch Tuesday Fixes Follina Bug Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft’s Final Patch Tuesday Fixes Follina Bug
  • Businesses need to be more aggressive with their cyber security, Cisco warns
  • The rise of phishing as a service (PhaaS) and how to tackle it
  • Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second
  • Patch Tuesday: Microsoft Issues Fix for Actively Exploited ‘Follina’ Vulnerability
  • New Syslogk Linux Kernel Rootkit Uses “Magic Packets” to Trigger Remote Backdoor Access
  • ClubCiso Report Shows Material Security Incidents Reduced by 54% Compared to Last Year
  • New Zimbra Email Vulnerability Could Let Attackers Steal Your Login Credentials
  • HelloXD Ransomware Variants Found Installing Backdoor on Windows and Linux Machines
  • What is the Essential Eight (And Why Non-Aussies Should Care)

Copyright © TheCyberSecurity.News, All Rights Reserved.