{"id":15028,"date":"2014-11-19T17:38:55","date_gmt":"2014-11-19T17:38:55","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2871"},"modified":"2020-02-26T10:57:43","modified_gmt":"2020-02-26T15:57:43","slug":"multilayered-defense-against-cybercrime","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/multilayered-defense-against-cybercrime\/15028\/","title":{"rendered":"Multilayered defense against cybercrime"},"content":{"rendered":"<p>There is something strange happening in the cybersecurity world. There are still individuals and businesses who believe \u201ca good antivirus\u201d would <a href=\"https:\/\/business.kaspersky.com\/seven-myths-of-corporate-it-security\/920\" target=\"_blank\" rel=\"noopener nofollow\">solve all potential security problems<\/a>, while some security experts say \u201cantivirus is dead\u201d and obsolete. While neither opinion is right, \u201cthe truth is out there.\u201d (<em>X-Files<\/em> music starts here.) Facing increasingly complex security threats, organizations around the world have to set up equally complex, multilayered defenses to protect themselves. A single-purpose security product will not do well.<\/p>\n<p style=\"text-align: center;\">\n<\/p><p><strong>Medieval sturdy<\/strong><\/p>\n<p>The medieval wooden doors we read about in schoolbooks and fantasy literature were renowned for their sturdiness. According to Wikipedia, a typical exterior wooden door might be made out of two layers of oak planks. The grain of the wood would run vertically on the front layer and horizontally on the back, like a simple form of plywood. Iron studs held the two layers of wood together, and the structure might be strengthened and stiffened with iron bands. The studs themselves would be pointed on the front, so that attacking warriors would damage their melee weapons while trying to break through such a door.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Multilayered defense against #cybercrime. #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7Z8A&amp;text=Multilayered+defense+against+%23cybercrime.+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The multilayered defense has been in practice since the ancient times: If an enemy breaks through the first row of security, he has to deal with several others, while suffering increasing losses on the way. According to contemporary conceptions, an assailing army must have at least a six-fold superiority in forces and facilities in order to win over well-prepared entrenched defenders.<\/p>\n<p>This is applicable to cybersecurity as well. According to <a href=\"http:\/\/ow.ly\/CF7XL\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Kaspersky Lab\u2019s Global IT Risks Report 2014<\/strong><\/a>, \u201corganizations around the world are facing increasingly complex security threats. And sadly, it\u2019s no longer the case that one product or approach can protect them from all types of malware, virus, or malicious program.\u201d<\/p>\n<p>Occasionally, there is talk of the <a href=\"https:\/\/business.kaspersky.com\/death-of-av\/1768\" target=\"_blank\" rel=\"noopener nofollow\">\u201cdeath of antivirus\u201d<\/a>, with various experts (sometimes even security software vendors) stating an antivirus is obsolete and we no longer need it.<\/p>\n<p>The fact is that we still do need it, but it won\u2019t work alone. Cybercrime tools today are very diverse, and you won\u2019t beat them with just antivirus software alone, no matter how good it is. A security solution without antimalware protection won\u2019t be very effective since new malware appears constantly. During 2013 and 2014, Kaspersky Lab detected nearly 315,000 malicious samples daily. Malware is in motion.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020207\/wide-21-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2873\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020207\/wide-21-1.png\" alt=\"wide (2)\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p><strong>In motion<\/strong><\/p>\n<p>The increase in mobile device usage adds to security problems, since it is smartphones and tablets \u2013 rather than PC and servers \u2013 that are the primary targets for cybercriminals. To ensure security a company requires a multilayered, multifaceted solution that covers the entirety of the cyber-perimeter, capable of fighting off malware, hacking attacks, phishing and other attempts on the security and integrity of the corporate data. This solution would also operate effectively across a range of software platforms \u2013 all of those used in the corporate network \u2013 as well as environments: LAN, cellular, wireless, wide area networks or a combination of them, IP-based communications, etc.<\/p>\n<p>Partial defenses are like large holes in a fence or a medieval door without locks or bars.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>AV is often deemed ineffective, but you\u2019re\u00a0not secure without it\u00a0or\u00a0by using it as a standalone solution.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7Z8A&amp;text=AV+is+often+deemed+ineffective%2C+but+you%26%238217%3Bre%C2%A0not+secure+without+it%C2%A0or%C2%A0by+using+it+as+a+standalone+solution.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The full version of Kaspersky Lab\u2019s Global IT Risks Report 2014 is available <a href=\"http:\/\/ow.ly\/CF7XL\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Medieval doors were extremely sturdy due to their two-layer construction and different wood grain directions across those layers. Multilayered defensive structures is a must in cybersecurity as well.  <\/p>\n","protected":false},"author":209,"featured_media":15859,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2231,2232,282,2233],"class_list":{"0":"post-15028","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-antimalware-solutions","10":"tag-antivirus-software","11":"tag-cybersecurity","12":"tag-multilayered-cybersecurity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/multilayered-defense-against-cybercrime\/15028\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/multilayered-defense-against-cybercrime\/15028\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/multilayered-defense-against-cybercrime\/15028\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/antimalware-solutions\/","name":"antimalware solutions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15028"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15028\/revisions"}],"predecessor-version":[{"id":33388,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15028\/revisions\/33388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15859"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}