Breached businesses just want the blue pill, says Brian Krebs

Countering the 'ignorance is bliss' mindset about hacks takes guts, researcher says

Too many organisations "just don't want to know" that they have been breached, putting themselves, their customers and the public at risk, according to security researcher Brian Krebs.

"One of the things I still can't get my mind around in a lot of ways is why it is that organisations still take on average months - sometimes four to six months - to detect after they have been breached," Krebs told delegates at McAfee's MPOWER conference last week.

Krebs compared this state of ignorance to thescene in sci-fi blockbuster The Matrix where its protagonist, Neo, is offered two pills; a red one that will reveal the real world to him, which he's told is nothing like the reality he thinks he knows, or a blue one, which allows the fantasy to continue.

Advertisement - Article continues below

"The way I describe why organisations take so long to detect breaches is they just take the blue pill - too many of these organisations just don't want to know or they just aren't curious enough," said Krebs, whose websiteKrebsOnSecurityhas charted dozens of high-profile hacks and cybercrime events.

"There might be a variety of reasons for that - maybe they don't have the buy-in from the folks at the top to have the strategy of assuming you're compromised and they see this as a career-ending goal if they pursue that," he mused. "But somehow we need to get more organisations to ... take the red pill."

Advertisement
Advertisement - Article continues below

Indeed, Krebs said that taking an "assume you're compromised" strategy is difficult for all involved, even if in his opinion it's "the best way to be secure at an individual and organisational level".

Equifax, which suffered a breach affecting 143 million US customers and nearly 700,000 UK customers in May after failing to patch an insecure server, but did not spot the hack until July, then failed to reveal the incident until September.

Advertisement - Article continues below

"It takes guts and not a little humility to admit that even though your organisation's spending tens-of-thousands, or even millions of dollars on cyber security [on] the latest weaponry that they have to offer, that you're still infested with [malware]. It takes a lot of guts particularly if you're the person in charge of security and trying to sell this idea to the higher-ups," Krebs said.

"It takes even more guts to build, to architect an information security team whose job it is to get up every morning with the belief that they're going to find intruders inside the perimeter of the network."

Nevertheless, taking the "red pill" and working on the basis of assumed compromised is, he said, at least as important in preventing and mitigating breaches as having the right security software and hardware in place.

Main image credit: Bigstock

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/security/phishing/355120/hackers-pose-as-three-to-exploit-high-data-demand
phishing

Hackers target Three customers with "sophisticated" phishing scam

26 Mar 2020