Charles Leaver – Surge Of Identity Thefts And Malware Attacks Means That You Need To Protect Your Infrastructure

This post has been composed by Charles Leaver, Chief Executive Officer Ziften Technologies.

In a report it was exposed that breaches of customer data suggests that there are a growing number of identity thefts being carried out these days. This is really disconcerting for everybody.

The report was carried out by the National Consumers League and it exposes that in the year 2013, around 33% of consumer data breaches resulted in identity fraud, and this means that the statistic has actually tripled since the year 2010. This concerning rise can be explained by some clear reasons. Cyber wrongdoers are employing much more sophisticated tactics now and there is an absence of cyber attack laws that require companies to disclose when they have had an attack. To make matters worse there are few organizations using endpoint detection and response systems to secure their data. All of this means that we are entering an environment where consumers are discovering that their data is continuously under attack by dishonest hackers.

John Breyault, who belongs to the National Consumers League, stated that cyber attack breach legislation like the one operating in California can assist with the reduction of breach reverberations by mandating the companies that have been breached to rapidly get the word out.

He went on to state that after a breach prompt notification is needed so that people can conduct a “damage analysis” once they learn about a breach. This is everybody’s right and at the moment the kind of issue that would set a notification in motion stays extremely broad.

Unfortunately, it is not only identification theft that is under the spotlight. A different report highlighted that malware is now more prevalent than it ever was.


Every Third Computer Has A Malware Infestation Revealed In A Report


The Anti Phishing Workers Group published a report mentioning that malware was most likely to be present in up to a third of the computer systems throughout the world by the last quarter of 2013. This is a considerable boost when compared to the previous quarter says Tech News World. The technical director of a security lab that examines cyber attacks, Luis Corons, stated that brand-new malware strains are being developed at a very rapid pace and that malware infections might increase even further.

He mentioned that the development of brand-new malware samples has actually simply escalated and it has actually doubled from the final quarter of 2013 to the very first quarter of 2014.

The findings of these 2 reports highlights that there is no room for complacency in companies when it pertains to security. Every organization has to sure up its endpoint detection and response systems or face the fact that a cyber attack is significantly most likely to be coming their way.



Charles Leaver

Charles Leaver – Implement Defenses Against Malware And Breaches To Avoid Fines

From Charles Leaver Ziften CEO

With malware becoming more stealth and the fines that enterprises deal with when they suffer a breach from it makes the case for installing endpoint detection and response systems even more vital than it was in the past. Without the best defenses executed there is not only the threat of a significant cyber attack, but also fines and claims that can be very harmful to a business. If a business thinks that it is immune to cyber attacks then they are being arrogant and naive. The cyber lawbreakers out there are making their attacks nearly undetected these days.

Major Malware Risk Now Averting Detection

Embedding a secret message into something unforeseen is called steganography and is not something new that has actually shown up with the Internet. In the 1600’s, Gaspar Schott produced a book which described how a secret message could be hidden in a musical arrangement and that this could be decrypted by those that understood about it. The approach used was the notes on the score would represent a letter of the alphabet and therefore the message could be checked out.

This practice has some distressing implications as it offers a nearly sure-fire way of concealing details that should not be there. Cyber lawbreakers have been utilizing steganography for several years now. It was reported in a Federal Plan Cyber Security which was released by the National Science and Technology Council in 2006, that steganography represents an especially sneaky way for terrorists to infiltrate U.S. systems.

The report mentioned that these tools are inexpensive and extensive making steganography an enabling technology for the foes of the United States.

Nowadays cyber security attacks are rampant and hackers are leveraging steganography to perform attacks that are almost undetectable and really sophisticated. In a paper on the threats of steganography, it was mentioned that there is momentum gathering in its usage among cyber crooks who can use the method to breach networks without detection. The report went on to say that Internet based steganography has become a lot more advanced and will just become more so in the years to come.

While steganography does present a big risk it can be alleviated by executing an endpoint detection and response system. This system will closely view all areas where a cyber wrongdoer could gain access and it is advised that organizations take this important step.

The Penalties Are High For Organizations That Are Exposed To A Malicious Breach

The threat of a steganographic attack ought to certainly suffice for you to install an endpoint detection and response system but if it isn’t then the significant fines that your company can face for a breach needs to be. Any company is vulnerable to attacks and fines. As an example of this the Women and Infant Hospital in Providence, Rhode Island, had to pay $150,000 as a result of a malicious breach which saw the details of 12,000 people compromised. The Modesto Bee stated that the data that the healthcare facility lost consisted of Social Security numbers, dates of birth and even ultrasound images.

The corporate world can also suffer at the hands of a cyber attack. eBay dealt with a law suit from a client in Louisiana after they were attacked according to Computerworld. Colin Green, who submitted the lawsuit, is not alone in being disappointed and represents millions of people who were not pleased that their personal data was exposed when the cyber attack occurred at eBay. The prospective fines and law suits make the financial investment in a proven endpoint detection and response system really worthwhile.


Charles Leaver