{"id":870,"date":"2021-09-01T10:57:00","date_gmt":"2021-09-01T10:57:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=870"},"modified":"2023-10-03T06:18:53","modified_gmt":"2023-10-03T06:18:53","slug":"the-shift-in-cybersecurity-its-time-to-stop-focusing-on-your-perimeter-and-start-focusing-on-your-data","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/the-shift-in-cybersecurity-its-time-to-stop-focusing-on-your-perimeter-and-start-focusing-on-your-data\/","title":{"rendered":"The shift in cybersecurity: It\u2019s time to stop focusing on your perimeter and start focusing on your data"},"content":{"rendered":"\n

It\u2019s a sad fact of life in 2021 that cyberattacks are inevitable and data breaches are highly likely. So why are so many businesses focused on keeping cybercriminals out, instead of limiting what they can do once they get in? <\/p>\n\n\n\n

Most enterprises are aware of the need to protect themselves from cyberattacks, and employ some form of perimeter security to that end, whether that\u2019s in the form of network firewalls, anti-malware software, intrusion detection and prevention systems, or all of the above. <\/p>\n\n\n\n

Over time, and in line with the WFH explosion, that perimeter security mindset has expanded to endpoint security \u2013 the practice of securing network-enabled devices like desktop computers, laptops and mobile devices from attack. <\/p>\n\n\n\n

But despite these efforts to keep bad actors out of their environment, businesses are falling prey to cyberattacks with alarming regularity. A recent Australian Institute of Criminology report<\/a> estimated the total annual economic impact of cybercrime in Australia at $3.5 billion, while the FBI reported a 400% increase<\/a> in cybercrime after the onset of COVID-19. <\/p>\n\n\n\n

A report into the economic impact of cybercrime by McAfee and the Center for Strategic and International Studies (CSIS) found the global losses from cybercrime had reached almost $1 trillion by the end of 2020<\/a>, while the number of groups launching ransomware attacks grew month on month throughout 2020<\/a>. <\/p>\n\n\n\n

Cybercrime is spiralling out of control, despite significant investments in perimeter security \u2013 and there\u2019s a simple reason for that. <\/p>\n\n\n\n

The limits of perimeter security <\/h3>\n\n\n\n

The reality is that you can have all the protection mechanisms in the world in place, but one human interaction can bypass all of them. <\/p>\n\n\n\n

That\u2019s not to say perimeter security isn\u2019t important. Of course it is \u2013 there\u2019s no point making a cybercriminal\u2019s life any easier for them, and perimeter security certainly plays a role in reducing risk. It\u2019s just not the be-all and end-all that some businesses might think.<\/p>\n\n\n\n

The ever-increasing interconnectivity of networks, and the sharing of information across them, is providing cybercriminals with more opportunities to seize data, as this data is often less secure while in motion (i.e. actively moving from one location to another). <\/p>\n\n\n\n

And while networks have become more secure, social engineering \u2013 the old-fashioned art of the con, exploiting human error and psychology \u2013 remains the most effective way to bypass an organisation\u2019s defences. <\/p>\n\n\n\n

Social engineering is less of a hack, in the traditional sense, than it is a trick. A phishing email is a social engineering scam, for instance. And as the world becomes more connected, and more information about a business\u2019 employees becomes available online, it becomes easier for attackers to trawl for details that will make these tricks more compelling and convincing. <\/p>\n\n\n\n

Once an attacker finds their way into your infrastructure through a careless or compromised user on the inside (or even, for that matter, a malicious user like a disgruntled employee), perimeter security is powerless to do anything about it. <\/p>\n\n\n\n

Cybersecurity expert Mathias Gaertner, Director of the Technical Advisory Board at the Australian Computer Society (ACS), says perimeter security fails to take into account the human factor<\/a>. <\/p>\n\n\n\n

\u201cWith ransomware, it\u2019s usually the user who invites in the intruder through clicking a link in a phishing email that installs spyware,\u201d he said. \u201cThis constitutes a breach which a firewall can\u2019t work against.<\/p>\n\n\n\n

\u201cIt\u2019s like a castle with a moat, but everyone inside has the freedom to do whatever they want within those walls.\u201d <\/p>\n\n\n\n

Cryptoloc founder Jamie Wilson agrees that perimeter security has its limitations<\/a>. <\/p>\n\n\n\n

\u201cThink of it like a house,\u201d he says. \u201cThe perfect home security system has got CCTV cameras, bars and security screens on the windows, double deadlocks on the door, a massive fence and maybe even a couple of vicious dogs. Those are your perimeter controls.<\/p>\n\n\n\n

\u201cBut the weakest link in that security system is the person who\u2019s already inside the home, and is scammed into letting a criminal walk through the front door. Well, it\u2019s the same with an employee who opens a phishing email, or connects to the wrong IoT device \u2013 before you know it, the cybercriminals are inside your system, and your perimeter controls that were supposed to stop anyone from getting in can\u2019t protect you.\u201d<\/p>\n\n\n\n

As soon as an attacker can convince a user to do something for the attacker\u2019s benefit, they\u2019ve effectively bypassed whatever perimeter security controls an organisation might have in place \u2013 but there is still a way for that organisation to take back control. <\/p>\n\n\n\n

Beyond perimeter security <\/h3>\n\n\n\n

Ultimately, the key to overcoming the limits of perimeter security is to put data security first.<\/p>\n\n\n\n

After all, your data is your bedrock \u2013 it\u2019s the reason you have perimeter security controls in place in the first place, and it\u2019s what cybercriminals are after when they attempt to breach those controls. <\/p>\n\n\n\n

Cybercriminals are increasingly utilising a tactic known as \u2018double extortion\u2019<\/a>. Not only do they force organisations to pay a ransom to unlock their encrypted files, but they also threaten to leak the data in those files if the ransom isn\u2019t paid.<\/p>\n\n\n\n

Compliance requirements, such as the European Union\u2019s groundbreaking General Data Protection Regulation, have also highlighted the role of data privacy, and the need for organisations to place a greater emphasis on data security. <\/p>\n\n\n\n

But too often, businesses overlook or neglect the role of data-centric protection in a comprehensive security solution. <\/p>\n\n\n\n

Essentially, it\u2019s a matter of changing your mindset to focus more on the outcome of a cyberattack (the loss of data) than the method of attack (such as a perimeter breach).<\/p>\n\n\n\n

It\u2019s the data breach, not the unauthorised access to your network, that will truly cost you \u2013 not just in terms of whatever it costs to recover that data, but also because of the reputational hit your business will take, and the potential legal ramifications you could face in the form of lawsuits from aggrieved customers and fines from regulators.   <\/p>\n\n\n\n

Obfuscation techniques, such as Cryptoloc\u2019s patented three-key encryption technology, will enable you to protect your data when perimeter security and the other controls you have in place fail. Cryptoloc\u2019s technology also encrypts data while it\u2019s in transit between networks. <\/p>\n\n\n\n

Encryption renders stolen data worthless to anyone who gains access to it without authorisation. Even if an attacker breaches your perimeter and gets into your network, what they find there will be of no value to them if the data is securely encrypted.  <\/p>\n\n\n\n

\u201cIf the intruder is within the network or firewall, but the data is encrypted,\u201d Mathias Gaertner says, \u201cit makes that data useless to them.\u201d <\/p>\n\n\n\n

It\u2019s also important to back up your data as often as possible, so that it\u2019s easily recoverable in the event of a breach and you won\u2019t be beholden to a cybercriminal to get it back, and to track changes, in case a cyber attacker has had access to your system for some time. <\/p>\n\n\n\n

With Cryptoloc Cloud<\/a>, for instance, you can see exactly who accessed your data and when, with every user and action verified and accounted for. You can then safely access any version of your content at any time. <\/p>\n\n\n\n

Having control over that data \u2013 choosing who has access to it, and knowing what they do with it \u2013 is the only way to secure your system in the event of a perimeter breach. <\/p>\n\n\n\n

There\u2019s no doubt that investing in perimeter security is worthwhile. But to truly reduce your risk and combat the threats posed by today\u2019s cybercriminals, securing your data should be your top priority.<\/p>\n","protected":false},"excerpt":{"rendered":"

It\u2019s a sad fact of life in 2021 that cyberattacks are inevitable and data breaches are highly likely. So why are so many businesses focused on keeping cybercriminals out, instead of limiting what they can do once they get in?  Most enterprises are aware of the need to protect themselves from cyberattacks, and employ some […]<\/p>\n","protected":false},"author":3,"featured_media":1093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/870"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=870"}],"version-history":[{"count":1,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/870\/revisions"}],"predecessor-version":[{"id":871,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/870\/revisions\/871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1093"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}