Advanced Threat Detection Buying Guide: Page 2
Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.
Do Not Forget User Education
Those considering augmenting their existing security arsenal with advanced threat detection can learn a thing or two from the experts. Wiseman said that AV software remains a vital component of a complete network security plan, even though most AV companies admit it is no longer sufficient to stop all of the threats that are being developed. He also cautions businesses not to rely solely on technology.
"One of the easiest ways to get broken into is to not educate your end-users of security precautions and creation of effective passwords," he said.
Wiseman gave the example of an email sent to a company’s employees pretending to be from the IT organization asking each recipient to send their password back to the email address. While 52 people asked the IT department if this was a real request, another 110 employees emailed their passwords right back to the spoofed address. According to Verizon, 23 percent of recipients open phishing-type email messages. Another 11 percent click on attachments. To make matters worse, nearly half of the victims of these phishing emails act within an hour of receiving them. Clearly, user education has to be an ongoing effort.
"Financially motivated attackers use a growing arsenal of sophisticated attack toolkits and social engineering tactics tested to defeat signature-based detection," he said. "Attackers carry out targeted attacks to zero in on valuable intellectual property, account credentials and other sensitive information. They use methods that can bypass even the most thoroughly configured appliances."
Drew Robb is a freelance writer specializing in technology and engineering. Currently living in Florida, he is originally from Scotland, where he received a degree in geology and geography from the University of Strathclyde. He is the author of Server Disk Management in a Windows Environment (CRC Press).
By Phil Britt
August 19, 2015
The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.