It's Beginning to Look a lot Like Breach-mas...

December 12, 2016 by Hobie Thompson

The holidays are upon us, and it's a great occasion to celebrate. However, it's also a great occasion for hackers to take advantage of an exposed business. While you're celebrating, is there somebody watching your IT infrastructure and assuring it's not breached? If your answer is anything other than "yes," then you need to think: when you're gone for a vacation, you make sure somebody is watching your house - why shouldn't you do the same for your critical data and business assets? And if your answer is "yes" - well, you may not be as right as you think.



Explains IT Security Expert TJ Trent, "Traditionally, information security best practices dictated a combination of continuous diagnostics monitoring (CDM) as well as certification and accreditation. These measures are passive approaches and severely curtail our ability to defend our networks." What Trent is saying is vitally important to understand. Security monitoring is only one part the equation. 

While, as we've discussed in prior blog posts, Secuirty Event and Information Management (SIEM) is a fundamental tool, it requires a human presence too. We maintain staff on All Covered Advanced Security teams every minute of every day - so we can bring more than just computer intelligence to the field. Of course, as we head into 2017, we keep in mind hackers enjoy being one step ahead. Simply put, they are coming up with new and innovative ways to breach security. As hacking expert Adi Sharabani explains, "Often, [a] hack or data breach occurs without the [users] knowledge." This strategy is becoming increasingly commonplace - hackers breaching an account, stealing data, but changing nothing, leaving companies none the wiser.

In order to truly survive in a world where companies are facing breach attempts every second, you must maintain a team that not only utilizes a strong scanning solution, but a human solution as well - because when you're opening presents, chances are, someone is trying to breach your network. Are you prepared?