Today’s latest news of the US government data breach is a prime example of why organizations must review their current, out-dated emphasis on breach prevention rather than detection.

The security world is preoccupied with the idea of stopping breaches – and yet the evidence reveals that this strategy is not working.  Modern IT environments don’t conform to Security Best Practices – lots of changes are being made, not always in the best interest of maintaining security and too much change ‘noise’ makes it harder than ever to spot unusual and unwanted activity. Even in a well-run and secure estate, breaches are still happening through phishing, zero-day malware, and insider attacks.

In this situation, as with many others, it was only by using intrusion detection techniques that the breach was spotted – by implication, the extensive cyber security defenses operated have been ineffective to prevent this hack.

While the breach detection alert may not have resulted in the attack being headed off completely, importantly, it will have lessened its potential impact. Ideally, internal systems would have also been hardened and protected from secondary attacks so that, even if network perimeter defenses are breached, data would still have been secured.

It is time to stop pretending that current security policies can stop any breach from working its way into key systems. It is time to find a new model that gives organizations – and all their stakeholders – a better way of responding to the continually evolving security threat.  And that has to be better breach detection capabilities. It is only by spotting the breach in time that an organization has any chance of effectively managing it. Fingers crossed that it will be stopped is just not good enough.

 

Learn about NIST SP 800 compliance

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.