In-depth

Top 10 threats facing the enterprise - Part One

We speak to the security experts on the frontline about the threats they see as most serious for businesses.

You only need to read the news headlines to appreciate that the enterprise is increasingly under attack, but how can you best defend your business from those who would do it harm?

The answer is to identify both current threats and those which are most likely to become the next big blot on the enterprise IT security landscape.

Knowledge is power, as they say, so IT Pro asked those on the frontline in the fight against the bad guys to help us compile a top 10 enterprise security threats from Targattacks to IPv6 and advise you on how best to mitigate the accompanying risks.

Here are entries one to five, with the second half of the list coming later this week:

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

1. Targattacks

Targattacks, also known as Advanced Persistent Threats (APTs), aren't really new, but offer a new umbrella term for a group of operators that have a full spectrum of intelligence-gathering.

"These people have proper reconnaissance to determine the best attack vectors," said Jeff Schmidt, BT global head of business continuity, security and governance. "Meanwhile persistence defines the specific nature of the attack. These are specific and continue until the goal is accomplished rather than being opportunistic".

To mitigate the risk of falling victim to a Targattack, security evangelist with G Data, Eddy Willems, warns that enterprises need to be careful when choosing a security solution.

It is invaluable to educate users about the risks and how to spot these attacks.

"Due to the human element evident in these targeted attacks, businesses should select a solution that includes behaviour blocking, application control and heuristics," Willems says. "It is also invaluable to educate users about the risks and how to spot these attacks".

Advertisement - Article continues below

Jay Huff from ArcSight recommended enterprises take a holistic view of what is going on across the network. "In military circles it's called situational awareness" Huff said.

"It's only by seeing the overall pattern of behaviour that suspicious patterns emerge".

2. Highly Sophisticated Malware

Malware isn't new, but it remains one of the biggest threats to the enterprise as the bad guys continue to up the stakes and produce some really quite sophisticated exploits in order to gain access to your business data.

Advertisement
Advertisement - Article continues below

Ed Rowley from the M86 Security Labs told us it has seen a "marked increase in sophisticated malware," which can be spread through Combined Embedded Files. These often go undetected by phishing protection, and one of the methods used is to attach HTML versions of cloned websites to emails rather than linking to those sites directly.

Combined attacks are on the increase, and in the first half of 2011 M86 Security Labs saw numerous targeted attacks using Microsoft Excel files with embedded Flash (.swf) files to exploit vulnerabilities.

Advertisement - Article continues below

This method, used in the targeted attack against RSA, is hard to detect by anti-virus and other security solutions because both components must be separated for analysis. Rowley advised that "enterprises without a proper patch management policy and outdated gateway protection will start to find they are fighting a losing battle" when it comes to blocking such attacks using sophisticated malware methodology.

3. SQL Injection

You might have thought that by now SQL code injection techniques as an attack methodology would be dead in the water. After all everyone knows about them and they are old hat, right?

Try telling that to the likes of Heartland Payment Services or the Sony PlayStation Network, both of which fell victim to SQL Injection led attacks.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020