The Threat Landscape is Changing

Are You Ready?

  • LinkedIn

Slider_2nd_Tier_Header_02


The I.T. threat landscape is rapidly changing and few are immune.

With cyber criminal profits dramatically increasing we expect a

significant rise in targeted attacks and the complexity of malware.

The question is:  Will you be ready?


In 2016 we believe there are four attack vectors to be acutely aware of:Firewall_Guess2

  • Targeted Attacks & Advanced Persistent Threat
  • Social Engineering
  • Encrypted Traffic Inspection and Analysis
  • Virtualized System Security

Throughout 2015 we’ve seen high profile attacks expose millions of customer specifics as the criminal element gets more savvy, bold and daring with their attacks.  The attacks are getting so complex, not just technologically but socially, that even the most sophisticated I.T. staffer could be fooled by a targeted attack.

In 2016, there will be renewed focus by the criminal element on enhancing their encrypted vectors and methods.  Google, and other browser engines, are giving preferred search result ratings to those sites that are either SSL or TLS encrypted.  The result; if your security doesn’t include the ability to inspect SSL/TLS traffic then malicious traffic will make its way to your endpoints.

We have also seen a dramatic attack focus on virtualized systems, where East/West traffic, is rarely scanned, logged or controlled resulting in increased infection rates.  Companies are placing their data eggs in a single basket which make it an easy attack vector to focus on.  If cyber criminals are not trying to steal your data then the are encrypting it for ransom.  And Yes!, the ransoms are getting paid and they are successfully getting away with it.

What’s Your 2016 focus?:

  • SSL Inspection:  Identify and deploy methods to inspect SSL & TLS traffic
  • Security Awareness Training:  Train your staff to be vigilant and IT security aware
  • Virtualization Security – Server & Desktop:  Protect against transient & malicious  East/West traffic
  • Sandboxing & Malware Threat Discovery:  Deep-inspection of all traffic for malicious or abnormal activity