Starting from the data proposed by Zone-h.org online database every day an average of 100 .co.uk domain websites are hacked, the data are really concerning if we consider that the trend is on the rise and that in many cases the impact on the security of a wide audience of users is serious.
“Over 95 percent of businesses are already compromised with malware (source: FireEye) but don’t know it…..the mindset needs to change from when we are compromised, to we are already compromised and how do we better protect our assets, intellectual property, etc. and mitigate future risks?”
Another reflection that must be done is that also the number of targeted attacks is increased, spear fishing and watering hole are the principal methods of attack for state sponsored hacking operations, in many cases hackers exploited zero-day vulnerabilities.
FireEye is one of the most active company in the security scenario, it has in fact detected in 2013 various zero-day flaws, some of them still not fixed
The statistics on on security for websites are discouraging, more than 80% are vulnerable, meanwhile 75% of new attacks specifically target the application layer of systems in order to exploit these flaws according data provided by U.S. CERT.
The improvement of the incident response (IR) capabilities is becoming a must for private companies and government agencies, it is crucial to identify cyber threats as soon as possible, to reach the goal it is necessary the definition and deployment of best practices to mitigate the risks of exposure to the menaces.
Another essential factor is the information sharing on the cyber threats, organisms like CERTs must fulfill this function also, businesses must receive accurate information of infections to adopt proper mitigation strategy.
Businesses, and in particular each single employee, must have a clear idea of task to do in case of incident, roles and responsibilities must be clearly defined and all the actions must be carried on to repairs an ordinary situational and preserving information useful for investigation.
Incident response is a critical component in a cyber strategy, it must be accurate and detailed as it provides valuable guidance in the immediate aftermath of an accident, moments when it is necessary to preserve as much as possible the critical assets of an organization.
“It’s important to be able to answer the who, what, how, when, and why questions that should be addressed, and critical if it’s a high value computer that has been infected.” states the post.
Which are the critical actions for an effective incident response procedure?
Based on my personal experience the trend is to secure the victim organization, but in the majority of the case are ignored all the action necessary to collect evidence of the attacks and to produce sharable results, the side effect is the lack of information about ongoing attacks that is the base for cyber threat identification and mitigation.
Following the point of view provided by FireEye experts:
“The containment and remediation process has up until now been a primarily manual human process, but lots of vendors FireEye partners with today are seeking to redress the balance by automating the containment and forensics parts with software products. The pain is recognized that skilled humans do not scale and sadly not every organization has the budget to spend on this.”
The incident response procedure is essential for small business and large organizations, independently of the type of menace and the nature of the attackers.
It is quite impossible to recognizing every cyber threat and mitigate it, but it’s absolutely crucial a mature approach to cyber security that is composed also of an efficient incident response plan that makes system resilience to survive cyber attacks and quickly recover from an incident.
“Building out an incident response capability is something that should be on your list of actions for 2014!”
(Security Affairs – Incident response, security)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.