In-depth

Top 10 threats facing the enterprise - Part One

We speak to the security experts on the frontline about the threats they see as most serious for businesses.

You only need to read the news headlines to appreciate that the enterprise is increasingly under attack, but how can you best defend your business from those who would do it harm?

The answer is to identify both current threats and those which are most likely to become the next big blot on the enterprise IT security landscape.

Advertisement - Article continues below

Knowledge is power, as they say, so IT Pro asked those on the frontline in the fight against the bad guys to help us compile a top 10 enterprise security threats from Targattacks to IPv6 and advise you on how best to mitigate the accompanying risks.

Here are entries one to five, with the second half of the list coming later this week:

1. Targattacks

Targattacks, also known as Advanced Persistent Threats (APTs), aren't really new, but offer a new umbrella term for a group of operators that have a full spectrum of intelligence-gathering.

"These people have proper reconnaissance to determine the best attack vectors," said Jeff Schmidt, BT global head of business continuity, security and governance. "Meanwhile persistence defines the specific nature of the attack. These are specific and continue until the goal is accomplished rather than being opportunistic".

To mitigate the risk of falling victim to a Targattack, security evangelist with G Data, Eddy Willems, warns that enterprises need to be careful when choosing a security solution.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

It is invaluable to educate users about the risks and how to spot these attacks.

"Due to the human element evident in these targeted attacks, businesses should select a solution that includes behaviour blocking, application control and heuristics," Willems says. "It is also invaluable to educate users about the risks and how to spot these attacks".

Jay Huff from ArcSight recommended enterprises take a holistic view of what is going on across the network. "In military circles it's called situational awareness" Huff said.

"It's only by seeing the overall pattern of behaviour that suspicious patterns emerge".

2. Highly Sophisticated Malware

Malware isn't new, but it remains one of the biggest threats to the enterprise as the bad guys continue to up the stakes and produce some really quite sophisticated exploits in order to gain access to your business data.

Ed Rowley from the M86 Security Labs told us it has seen a "marked increase in sophisticated malware," which can be spread through Combined Embedded Files. These often go undetected by phishing protection, and one of the methods used is to attach HTML versions of cloned websites to emails rather than linking to those sites directly.

Advertisement - Article continues below

Combined attacks are on the increase, and in the first half of 2011 M86 Security Labs saw numerous targeted attacks using Microsoft Excel files with embedded Flash (.swf) files to exploit vulnerabilities.

This method, used in the targeted attack against RSA, is hard to detect by anti-virus and other security solutions because both components must be separated for analysis. Rowley advised that "enterprises without a proper patch management policy and outdated gateway protection will start to find they are fighting a losing battle" when it comes to blocking such attacks using sophisticated malware methodology.

3. SQL Injection

You might have thought that by now SQL code injection techniques as an attack methodology would be dead in the water. After all everyone knows about them and they are old hat, right?

Try telling that to the likes of Heartland Payment Services or the Sony PlayStation Network, both of which fell victim to SQL Injection led attacks.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement
Advertisement

Most Popular

Visit/security/cyber-crime/355171/fbi-warns-of-zoom-bombing-hackers-amidst-coronavirus-usage-spike
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
Visit/security/data-breaches/355173/marriott-hit-by-data-breach-exposing-personal-data-of-52-million
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020
Visit/software/business-apps/355178/ibm-call-for-code-starter-kits-target-coronavirus-solutions
business apps

IBM Call for Code starter kits focus on coronavirus solutions

31 Mar 2020