Story image

Using layered security to stay safe over the holidays

18 Dec 18
Sponsored

Holidays are a particularly active time for cybercriminals as large volumes of transactions are conducted online.

The days leading up to the festive season are prime time for attackers to build malware, ransomware, and phishing campaigns to prey on holiday shoppers.

SonicWall found that at a macro level, malware attacks dipped in 2018, while ransomware, phishing and cryptojacking attacks all increased significantly.

Over the nine-day Thanksgiving holiday shopping window from November 19 to 27,  it found that its customers faced:

  • 91 million malware attacks (34% decrease over 2017)
  • 889,933 ransomware attacks (432% increase over 2017)
  • 45% increase in phishing attacks compared to the average day in 2018

As online shopping becomes increasingly convenient and accessible, more and more consumers are doing their Black Friday shopping online instead of in brick-and-mortar stores.

According to Reuters, online sales surpassed $6 billion on Black Friday in the US — a 23% jump over last year.

At the same time, SonicWall’s Capture Labs threat researchers recorded 28 times more ransomware attacks on Black Friday compared to last year.

As cyber criminals become more aggressive, organisations need to seriously consider taking a layered approach to cybersecurity in order to keep themselves safe.

How layered security protects the enterprise

A layered approach means having different levels of security measure that systematically filters out different types of threat as information is accessed by the user

SonicWall CEO Bill Conner and CTO John Gmuender explain how layered security works, from the firewall to real-time deep memory inspection.

Conner says that most of SonicWall’s competitors fail on not putting the firewall on non-standard ports which, malware writers take advantage of.

“If your firewall doesn't analyse non-standard ports, it's a huge gap.”

He adds that many of them don't turn them on more ports because performance goes down when they do.

DPI-SSL 

In 2017, there were over 1000 encrypted threats per SonicWall customer.

The second layer of security is Deep Packet Inspection of Secure Socket Layer (DPI-SSL).

Gmuender says, “If you have a connection using SSL, it's encrypted. If malware is utilising a connection like that, you don't get visibility into the connection without DPI-SSL."

“Nothing else will help if it's still encrypted,” Conner adds.

Email Security 

Conner says that email is the number one way attackers infiltrate an organisation, with over 3000 phishing attacks being found per customer.

“They come in through either phishing, whale phishing or plain email; through pdfs, and through Microsoft Office applications.

Gmuender adds that SonicWall’s email security has integrated capture, meaning all the analysis happens locally in the solution.

Capture ATP Sandbox 

The next layer of security is the sandbox.

“Just on the traditional sandbox engine, virtualisation, hypervisor and emulation, we're up to a 1000 threats identified a day, and it's doubled in a year,” Conner says.  

The sandbox also contains the two percent of malicious files that get through the first three security layers.

Real-time deep memory inspection (RTDMI)

“I've spent a lot of time with governments and enterprises behind the curtain on what this is finding, and there are three key findings,” Conner says.  

The first finding is that the largest three items, in terms of vulnerabilities that aren't being seen by traditional sandboxing, are Microsoft Office applications, pdfs, and increasingly now, side-channel attacks – such as the fourth iteration of a side-channel on an Intel chip.

“So, you've heard of Meltdown, you've heard of Spectre, you've heard of Foreshadow, the last one just came - RTDMI is going to be the most important thing for small-to-medium businesses, enterprises, governments.”

Conner says in the next two years, these unknown malware attacks through pdf, Microsoft Office, and side channels are going to be dramatically increasing, and they're going to be extremely dangerous.

“And that's why we placed this capability behind every solution we have.”

Find out more in SonicWall's 2018 Cyber Threat Report.

Three things that will happen in 2019 – and one that will not
Commvault's Nigel Tozer reflects on the year that's been and the one ahead with three predictions of what will be and one that won't.
Huawei CEO goes public on CFO arrest & China security concerns
Ken Hu faced a press conference where he addressed all the elephants in the room and growing concerns around the company's future.
A10’s app delivery solution now on Azure Marketplace
With the Harmony Controller, organisations can automate deployment and operations of application services.
The pillars of ethical automation
"As the builders and users of autonomous systems, it’s important that we consider what ethical automation should look like."
Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.