Page 6 - AeM_June_2019
P. 6

RESEARCH, ANALYSIS & TRENDS









































             Security is a journey, not a destination



            Now, more than ever, cybersecurity  teams are seeking    using  their  own  computing  resources.  But  it
            to  become  more  agile.  They  help  organizations  meet   becomes  illegal  when  they  use  someone  else’s
            regulatory  compliance  requirements,  align  to  industry   resources – CPU power and energy – without their
            best  practices,  and  accelerate  business  transformation   knowledge  or  permission,  to  mine  cryptocurrency
            initiatives.  Effective  cybersecurity  acts  as  a  business   for  their  own  financial  benefit.  In  2018,
            enabler – building customer, shareholder, and employee   cryptojacking, while still in its infancy, caught many
            trust. This enables organizations to protect and enhance   organizations   off-guard   and   represented   a
            their  reputation  and  reduces  the  risk  of  the  many   significant  amount  of  hostile  activity.  Protect  your
            negative consequences of a cybersecurity breach.         organization  from  the  threat  of  cryptojacking  by
                                                                     applying ‘least privilege’ controls and implementing
            By providing value to the business, cybersecurity helps   egress and ingress filtering restrictions, as well as
            differentiate  in  an  otherwise  crowded  marketplace  and   browser  plugins  to  limit  site  functionality.  Also,
            improves  users’  and  customers’  experience.  From  on-  deny  Stratum  protocol  usage,  and  segment  your
            premise  IT,  mobile  devices,  connected  operational   network environments.
            systems,  to  public,  private,  and  hybrid  technology
            deployments, cybersecurity leaders need the confidence   •  Credential theft isn’t a concept that’s new to most
            that  their  infrastructure  and  data  are  adequately   people  –  but  in  the  context  of  cybersecurity,  it’s
            protected.                                               become  increasingly  prevalent  over  the  last  few
                                                                     years. Credentials are the ‘keys to your kingdom’,
            For  several  years  now,  Dimension  Data  publishes    protecting  your  organization’s  networks  and  data
            an  Executive  Guide  that  provides  insights  in  and   from  unauthorized  access.  This  makes  stolen
            analysis  from  the  shifting  threat  landscape,  with  best   credentials  a  valuable  target  for  threat  actors.
            practice  guidance  and  practical  measures  to  bolster   Dimension Data’s observations reveal that phishing
            cybersecurity defences, including the following:         and  malware  are  cybercriminals’  techniques  of
                                                                     choice when it comes to launching credential theft
              •  Cryptojacking,  also  known  as  coin  mining,      campaigns  and  sees  a  spike  in  the  number  of
                cryptomining,  and  cryptocurrency  mining,  isn’t   credential  theft  attacks  targeting  cloud  platforms.
                necessarily  all  unlawful:  for  instance,  users  may   Successfully fending off credential theft attacks on
                install  a  coin  mining  program  on  their  personal   your  business  involves  implementing  multi-factor
                system  to  generate  cryptocurrency  for  themselves,

      6            June 2019 - Cyber-security & Data Protection
   1   2   3   4   5   6   7   8   9   10   11