Article

Malware Is Inevitable — But Beware of IT Fatalism

IT support technicians inspecting machine at manufacturing sites

What should our attitude be toward malware, ransomware, and other malevolent cyber threats?

We continually see coverage of cyber threats affecting enterprises, governments, and academic institutions. Right now, headlines are focused on the global cyber espionage campaign that hijacked SolarWinds Orion software. A few weeks ago, global cybersecurity firm FireEye was compromised and had hacking tools stolen by attackers. By the time you read this, you’ll likely see a completely different attack in the news.

Different Cyber Security Strategies

Our customers have a wide variety of approaches to the increasingly dangerous and sophisticated threat of malevolent actors within the boundaries of the enterprise IT security perimeter. Regardless of a business’ IT security strategy, passive indifference and IT fatalism are not options.

For example, we are currently working with a customer to implement a comprehensive immutable storage solution to mitigate cyber-attack risks that the client recognizes as likely and eventual.

Young woman logging in laptop account with two-step verification on smartphone. Privacy protection. Network security.

For Modern Cyberthreats, Immutable Storage Is a Necessity

Read More

With another client, we are helping them take proactive steps to close the most common entry points into administrative privileges. Before contracting with us, they had been hyper-focused on significant edge security investments, while no-cost best practices were being neglected.

Malware Prevention Is Only One Part of an Enterprise Cyber Security Strategy

In January of 2020, I attended the Hawaii International Conference of System Sciences (HICSS 2020). At that conference, Michael Fiske presented his paper, “Toward a Mathematical Understanding of the Malware Problem.”

In this article, Fiske succinctly describes the nature of the malware problem:

Malware can exploit a weakness in current computer systems: user authentication does not protect the execution of the user’s intended action. Malware can circumvent strong authentication on a hardware token even when it is tightly integrated with strong cryptographic protocols. As aptly stated by Shamir, “cryptography is typically bypassed, not penetrated.” It seems unlikely that malware detection methods can solely provide an adequate solution to the malware problem.

In short, malware will affect your systems, regardless of how robust your prevention apparatus.

Unfortunately, many people in corporate IT focus solely on detection and prevention instead of investing in remediation. This approach is also evident among companies that are most engaged in the IT security product domain as well as members of enterprise security teams.

But when you consider that companies as sophisticated as FireEye have been victims of supply chain attacks, we must conclude that enterprise IT teams cannot keep every malevolent threat at bay. This especially applies if your organization is considered a “whale” by organized hackers as a target of opportunity: video communication systems, school systems, healthcare, finance, etc.

Female data server employee fixing cables in the back of a server.

Immediate Steps for Ransomware Protection, Mitigation and Prevention

Read More

Enterprises Need to Focus on Remediation for Cyber Threats and Cyber Attacks

As Fiske demonstrates in his piece, “detection methods are currently up against fundamental limits in theoretical computer science.” Therefore, what cannot be prevented must be mitigated. As enterprise IT professionals, we need to ensure our data recovery strategy includes technologies that make recovery and forensics easier, faster, and more predictable. We cannot afford to invest only in defense and prevention and ignore the imperative for data protection.

IT leaders are stewards of our organization’s data. Our customers, employees, patients, providers, suppliers, and larger communities depend on us personally and economically. As informed, responsible professionals, we must take the initiative to put cyber recovery capabilities in place, even if the organization is not asking for it.

Because when the inevitable occurs, it is undoubtedly too late.

Vervint Will Help You Protect, Recover and Retain Your Critical Data

Vervint designs, architects, and supports backup and recovery solutions for G500 and regional healthcare clients, manufacturers and other enterprises. Want to get started? Don’t wait. Schedule some time with an expert or send us a message. We look forward to speaking with you!

About the Author

mm

Jim VanderMey

Author Title

Jim VanderMey is the Chief Innovation Officer for Vervint. Jim has provided technical leadership and product strategic planning for the organization since the very beginning. Jim is a technology visionary who sets the long and short-term direction for Vervint. As our company has gained an international reputation, Jim has taught and spoken at conferences on a wide variety of topics in Europe, Japan, and throughout North America.