Accueil
Explorer
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
Publicité
Five Network Security Threats And How To Protect Your Business Wp101112
Signaler
Erik Ginalick
Suivre
Senior Account Executive à Regional Markets Group, CenturyLink Business
29 Jan 2012
•
0 j'aime
0 j'aime
×
Soyez le premier à aimer ceci
afficher plus
•
343 vues
vues
×
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Prochain SlideShare
idg_secops-solutions
Chargement dans ... 3
1
sur
4
Top clipped slide
Five Network Security Threats And How To Protect Your Business Wp101112
29 Jan 2012
•
0 j'aime
0 j'aime
×
Soyez le premier à aimer ceci
afficher plus
•
343 vues
vues
×
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Télécharger maintenant
Télécharger pour lire hors ligne
Signaler
Erik Ginalick
Suivre
Senior Account Executive à Regional Markets Group, CenturyLink Business
Publicité
Publicité
Publicité
Recommandé
idg_secops-solutions
Jonny Nässlander
122 vues
•
11 diapositives
Scansafe Annual Global Threat Report 2009
Kim Jensen
2.4K vues
•
28 diapositives
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
100 vues
•
28 diapositives
Managed security services for financial services firms
Jake Weaver
534 vues
•
10 diapositives
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
853 vues
•
38 diapositives
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
81 vues
•
7 diapositives
Contenu connexe
Présentations pour vous
(20)
Analyst Report: The Digital Universe in 2020 - China
EMC
•
579 vues
Topsec email security 2016
Nathan CAVRIL
•
2.2K vues
Why Passwords are not strong enough
EMC
•
2.2K vues
Rpt paradigm shifts
malvvv
•
284 vues
Rpt paradigm shifts
malvvv
•
104 vues
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
•
2.1K vues
Volume2 chapter1 security
at MicroFocus Italy ❖✔
•
350 vues
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
•
732 vues
Retail
CMR WORLD TECH
•
112 vues
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
•
436 vues
Why is cyber security a disruption in the digital economy
Mark Albala
•
201 vues
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
•
248 vues
beyond_the_firewall_0103
Jack McCullough
•
160 vues
Cyber Resilience white paper 20160401_sd
Susan Darby
•
238 vues
Master Thesis Security in Distributed Databases- Ian Lee
Ian Lee
•
1.2K vues
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Information Security Awareness Group
•
826 vues
10 security problems unique to it
IT-Toolkits.org
•
147 vues
InformationSecurity_11141
sraina2
•
197 vues
Cybercriminals and security attacks
GFI Software
•
300 vues
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
Bernard Marr
•
885 vues
Similaire à Five Network Security Threats And How To Protect Your Business Wp101112
(20)
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
•
4 vues
Toward Continuous Cybersecurity With Network Automation
Ken Flott
•
234 vues
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
•
2 vues
Emerging Threats to Digital Payments - Is Your Business Ready
Chukwunonso Okoro, CFE, CAMS, CRISC
•
232 vues
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
•
44 vues
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
•
40 vues
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
•
752 vues
12Cyber Research ProposalCyb
AnastaciaShadelb
•
2 vues
12Cyber Research ProposalCyb
ChantellPantoja184
•
2 vues
What is Importance of Cyber Security
Wee Tang
•
275 vues
Ijnsa050215
IJNSA Journal
•
381 vues
CC_Futureinc_Cyber Security
Alistair Blake
•
185 vues
Security Threats for SMBs
GFI Software
•
641 vues
Cisco 2014 Midyear Security Report
Cisco Security
•
2.4K vues
ASSIGNMENT CYBER SECURITY ppt.pptx
tumainjoseph
•
239 vues
ASSIGNMENT CYBER SECURITY ppt.pptx
tumainjoseph
•
22 vues
T CYBER SECURITY ppt.pptx
tumainjoseph
•
8 vues
Target Data Breach Case Study 10242014
Joseph White MPA CPM
•
2.4K vues
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
IJNSA Journal
•
21 vues
A Guide to Internet Security For Businesses- Business.com
Business.com
•
478 vues
Publicité
Plus de Erik Ginalick
(20)
Unleashing The Power Of Customer Data Wp091047
Erik Ginalick
•
335 vues
Understand Benefits Of Electronic Health Records Wp091005
Erik Ginalick
•
370 vues
Reaching For The Cloud Wp101366
Erik Ginalick
•
279 vues
Qmoe For Manufacturing Wp090862
Erik Ginalick
•
241 vues
Qmoe For Public Sector Wp090863
Erik Ginalick
•
204 vues
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Erik Ginalick
•
402 vues
The Worry Free Network Wp091050
Erik Ginalick
•
185 vues
Qmoe For Financial Services Wp090860
Erik Ginalick
•
289 vues
Qmoe For Healthcare Wp090861
Erik Ginalick
•
276 vues
Protecting Payment Card Data Wp091010
Erik Ginalick
•
211 vues
Planning For Disaster And Everyday Threats Wp111438
Erik Ginalick
•
295 vues
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Erik Ginalick
•
236 vues
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
•
333 vues
Plan For Success White Paper
Erik Ginalick
•
167 vues
Optimizing Your Communications In A Recession Wp090993
Erik Ginalick
•
331 vues
Is Cloud Computing Right For You Wp101305
Erik Ginalick
•
170 vues
Ipv Technical White Paper Wp111504
Erik Ginalick
•
374 vues
Ipv6 Technical White Paper Wp111504
Erik Ginalick
•
566 vues
Infrastructures For Innovation Wp090974
Erik Ginalick
•
281 vues
Healthcare It Security Necessity Wp101118
Erik Ginalick
•
213 vues
Five Network Security Threats And How To Protect Your Business Wp101112
Five NetwoRk SeCuRity
thReAtS ANd how to PRoteCt youR BuSiNeSS A layered approach to security may be your best defense ExEcutivE OvErviEw — cOntrOl layErs tO dO mOrE with lEss Threats abound in today’s corporate networks. There’s no getting around it. Keeping your enterprise and its data and corporate assets Security budgets are continuing secure necessitates a proactive security posture. Being proactive to feel the strain of the current involves understanding the assets that require risk mitigation and the economy. Unfortunately, proper controls to support your risk management strategy. This paper network and system threats uncovers the five most costly network security threats that enterprises won’t take a break, even in a battle today and how you can protect your business by implementing down market. key layers of control and taking advantage of managed security services to do more with less. EcOnOmic gain frOm thrEats — businEss thrEat is grOwing The increasing virulence of attacks over the past 20 years is considerable. Along with the global, connective nature of the Internet, threats have evolved from one-off incidents caused by fame-seeking hackers to organized attacks by malicious parties seeing profit. And as the reliance on IT infrastructure grows, the attack surface increases; there are more opportunities than ever. The trend is evident in the rise of “botconomics” — the joining of botnets to compromise a network in an effort to make money. Compromised digital assets have been monetized and, without proper security controls, are up for grabs. The economic force driving the underground value chain for stolen data is immense and has evolved to comprise black markets for selling stolen data, mules to carry out purchase transactions using the stolen data, auction market places to resell the goods, and currency transaction services to transfer the ill-gotten funds. Network attacks against major online brands such as Yahoo®, Google™ and Twitter™ have brought the issue to the media mainstream. Business communications and employee work behavior have evolved to increase the flexibility of where we work, how we access data, and applications we use to communicate. This flexibility has brought about consequences as it introduces new attack vectors to a company’s environment. More employees are using devices other than their work PCs to access data and are adopting communication applications that foster collaboration and social networks (i.e. wikis, IM, Blogs, Facebook®, Twitter). Without the confinement of applications, systems and communications within the corporate network of yesterday, the environment is now more mobile and diverse, and this has a huge impact on how we interact with data. Our workforces on the road or at home can access information from devices other than their PCs. Communication has expanded beyond email and instant messaging to other forms such as micro blogging, now used in the corporate environment. The question is, given this environment, how can you control the spread, or leakage, of data? Copyright © 2009 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. 1 All marks are the property of the respective company. September 2009. WP101112 1/10
Although companies must
operate according to certain governmental or industry requirements, and demonstrate to auditors that they are in compliance with those requirements on an ongoing basis, there’s always human error. People can unintentionally leak data through email or web sites. Technologies such as link prevention can help to control security mishaps, but they’re not fool proof. Fortunately, you can take steps to prevent threats, but you must first understand where the threats lie. The cost of security is high, including expenses for systems and tools, people and resources to configure and monitor security systems, and the time and material to develop the appropriate processes to ensure everyone adheres to policies. Before allocating your security budget, make sure you’re putting your dollars where they will be most effective. A solid understanding of the most damaging threats will help you make informed decisions about your security infrastructure. thE fivE mOst cOstly nEtwOrk sEcurity thrEats Network threats are numerous, but some are more deadly than others. Here are five of the most costly threats: 1. botnets. In the past, “botnets” were created for fun, and to satisfy the curiosity and egos of rogue hackers. These individuals would manually compromise systems and move on, without leaving too much damage. Today, botnets are virtual chop shops—sophisticated and monetized, they can be used for serious cybercrime. In fact, botnets are the primary vehicle for cyber criminals. They can be used to steal identities from hundreds of people on the other side of the world with a single attack. Today’s botnets are also more resilient. They’re built on tiered infrastructure and the technology they use has evolved to HTTP and peer-to-peer channels with encryption. Consequently, they’re hard to take down. They can also be managed remotely, so there’s a slim chance of finding the culprit. To combat the botnet threat, companies need security expertise. It’s worth the money, because the impact of a sophisticated botnet attack to an organization can be huge, resulting in a tarnished reputation, hefty fines and even lawsuits. And not only large companies need to worry; smaller companies are also at risk. 2. Phishing. The practice of “phishing,” or masquerading as a trustworthy entity to get credentials from someone over the Internet, is becoming more and more sophisticated and easy to do. There is a rise of kits on the open market that cost as little as $49. They enable anyone to copy legitimate sites and set them up for malicious purposes. Phishing is second only to spam for compromising systems on the Internet today, and many are hosted on botnets. Through phishing sites, hackers can harvest credentials of individuals and index them based on many dimensions. The impact is costly, resulting in fraud, stolen identities and compromised data. 3. malware. There’s been an explosion of malware in the last few years. According to a study from the University of Michigan & Arbor Networks Inc. called the Internet Malware Classification and Analysis (2007), 75,000 to 250,000 new families or variants of malware were released in 2006, and that number ballooned to 60,0000 to 80,000 per month in 2008. It’s estimated that there’s a new variant released every 30 seconds. Although antivirus software coupled with intrusion detection solutions is the front line of defense, it fails to detect malware 20–62% of the time. 4. distributed denial of service attacks. Distributed denial of service (DDoS) attacks are growing in number and in size. DDoS attack size continues to outpace the size of average dedicated Internet access circuits. According to a 2008 worldwide infrastructure security report by Arbor Networks, 57% of ISPs have reported attacks larger than 1 Gbps. Attacks of this size can cause prolonged outages of prominent Internet facing services, such as online bill pay and VoIP. 5. attack sophistication. Because many companies have put in infrastructure to mitigate simple attacks, the attacks are evolving and becoming more sophisticated, and they’re overwhelming network transactions on the back end instead of on the Internet facing side. DNS-based abuses like PRNG name generation, DDoS vectors and rouge DNS servers are common. Another attack vector is the router. Wormable attacks like Conficker can compromise as many as 2 million systems or more. Attacks of this magnitude are difficult for companies to prevent on their own with internal resources, and many are turning to cloud providers who can dedicate the resources to a more sophisticated security system. Copyright © 2009 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. 2 All marks are the property of the respective company. September 2009. WP101112 1/10
mitigating thrEats: thE
kEy layErs Of cOntrOl tO bE mOrE PrOductivE There are some key layers of protection that should be implemented to provide effective threat prevention and mitigation. For example, service providers can deliver security services to prevent the effects of phishing on enterprises by screening traffic before it enters the enterprise network. This capability enables users to be more productive, as well, because it lowers the infection risk and rate, and removes the burden of deleting spam and filtering out bad email. To fight malware, organizations need a combination of anomaly detection, customer premise equipment and ISP in-cloud security systems. When implemented only at the network’s perimeter, Intrusion Dectection or Preventions Service (IDS/ IPS) devices will drop unauthorized packets but cannot prevent a DDoS attack, because the number of packets would cause disruption to the Internet link. If you mitigate DDoS attacks in the cloud, the packets are dropped in the cloud, so only filtered traffic would travel to the corporate network. Using cloud services mitigates security issues away from the network to preserve people and resources, is often transparent to users and requires no additional hardware or software to be installed on the premise. Another security challenge involves the increasingly mobile workforce. Most companies have security at the perimeter because, historically, most system attacks occur there. However, as more employees work remotely, there’s a need to expand security to the laptop and other mobile devices and enforce endpoint compliance. One interesting technology available is endpoint compliance software offered by companies like Symantec, Checkpoint and Fiberlink. This technology allows you to enforce that end users use firewall and antivirus software any time they access the network remotely. Endpoint compliance software enables you to ensure all endpoints are compliance with corporate security policies by pushing out the latest patches and updates. In this way, you can be certain remote access points are not vulnerable to the latest exploits. There are a multitude of technologies are available for each layer of the network. It’s important to layer on all of these technologies for complete protection against all possible threats: • System level: Encryption and Human Interface Devices (HIDs). • Network perimeter: Firewalls, malware filters, IDS/IPS systems, content filtering, data leak prevention, spam filters and vulnerability assessments. • Cloud: DDoS mitigation, firewalls, malware filter, spam filters and vulnerability assessments. • Mobile devices: Firewalls, malware filter, anti-sypware, disk encryption, data leak prevention, and endpoint compliance. Copyright © 2009 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. 3 All marks are the property of the respective company. September 2009. WP101112 1/10
dO mOrE with
lEss — wOrk with a PrOvidEr tO incrEasE succEss Security budgets are continuing to feel the strain of the current economy. Unfortunately, network and system threats won’t take a break, even in a down market. The financial consequences of a breach will be even more devastating, so it’s important to invest wisely when planning your network security strategy. Evaluate the attack service in your network and determine what areas are critical to your business. As you anticipate your company’s future security needs, you may decide to partner with a service provider who can offer expertise and resources that you don’t have in-house. The benefits include predictable costs and solutions that have been designed, implemented and vetted in production environments. Working with a provider, you can avoid technology obsolescence and offload the heavy lifting while redirecting your own resources to revenue-generating efforts. Whether you take on the task of securing your network alone, or consult a partner, don’t ignore the threat, and take a layered approach to protect your network from every angle. CoNNeCt. SimPliFy. eNhANCe. ® with Qwest Business Solutions® Qwest is focused on helping you work smarter, with services that leverage the latest technology and award-winning support. Here are a few solutions that can address the issues covered in this solutions brief: managEd sEcurity sErvicEs With Managed Security Services, Qwest can administer and monitor your network on your behalf while you concentrate on other mission-critical elements of your business. Let Qwest allow you to focus on what’s important—your business. And, save you time and money through the use of our expert tools, skills, and processes to improve system uptime and performance, optimize security investments, improve employee productivity, and demonstrate compliance. Tools such as Qwest Anti-Virus/ Anti-Spam, Qwest Web Defense, and Qwest Managed Firewall create layers of protection to help reduce the costs and complexity associated with managing security while preventing the impact of security threats. why QwEst Qwest delivers reliable, scalable data and voice networking solutions, across one of the U.S. largest fiber footprints. Qwest serves businesses of all sizes, ranging from small business to 95 percent of Fortune 500 companies, with industry- leading SLAs and world-class customer service. lEarn mOrE For more information about Qwest voice and data services for large businesses, visit www.qwest.com/business or call (877) 816-8553 to speak to a Qwest representative. Copyright © 2009 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. 4 All marks are the property of the respective company. September 2009. WP101112 1/10
Publicité