Reports emerging today make great headlines even though the suggestion is that it was 'only' the unclassified network and no harm has been done. How do White House network user credentials get compromised in the first place?

In all likelihood, just as simple as any other usernames and passwords: through the credentials being phished or simply brute-forced/guessed.

While you can lock down systems to make them more ‘hack proof’ through hardening, as long as users still need access to systems they will always need access credentials; which are vulnerable to being compromised.

Fortunately, in this case, the breach was detected and headed off before the hackers got beyond the declassified network, but it does reiterate that if you can’t stop the breach, make sure you can spot the breach.

This breach is yet another example of why real-time, Continuous File Integrity Monitoring is a must-have.

 

Read details of the hack here

 

 

Contact Us

USA Offices

New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
 [email protected]

SC Magazine Cybersecurity 500 Infosec Security Winners 2018 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.