{"id":5940,"date":"2016-08-24T15:31:03","date_gmt":"2016-08-24T15:31:03","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5940"},"modified":"2020-02-26T11:10:43","modified_gmt":"2020-02-26T16:10:43","slug":"targeted-attack-mitigation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/targeted-attack-mitigation\/5940\/","title":{"rendered":"Targeted attack mitigation: everything can go wrong"},"content":{"rendered":"<p>Targeted attacks on businesses vary in their level of sophistication, goals and points of entry into the corporate infrastructure, but they all have one thing in common \u2013 they are ridiculously hard to detect. And that\u2019s not all, the remediation of an attack, once it\u2019s discovered, is also difficult. Time is critical. There are two major ingredients for an effective remediation approach \u2013 technology and intelligence.<\/p>\n<h3>Defining intelligence<\/h3>\n<p>The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it\u2019s not the only one. With companies spending up to 80% of their resources on prevention technologies, dealing with an active security breach may present them with a problem. Cybercriminals are very good at covering their tracks, so when an attack has been discovered, a company may find itself in a tricky position, with no knowledge of the number of compromised machines, logs erased, or evidence of a breach destroyed. Even worse, once a successful attack remediation has been reported, a business may actually still be at risk from an unidentified vulnerable point in the corporate infrastructure.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Targeted attack mitigation: everything can go wrong #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2cec&amp;text=Targeted+attack+mitigation%3A+everything+can+go+wrong+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Proper security intelligence combines knowledge about potential and real acts of corporate cybercrime, with the information and approaches needed to gather all necessary data on an on-going attack. Such a combination is achieved via expertise and tools, developed in-house and\/or by working with an expert security vendor.<\/p>\n<h3>Defining technology<\/h3>\n<p>Even a small company produces a huge amount of data. Terabytes of data are sent and received, and millions of connections are established every day, from e-mail communications, IMs, and social networks, to cloud services. An attack may affect just a handful of connections, but even a small chunk of data leaking to the outside world can bring a lot of trouble. There are millions of ways to breach the network perimeter. It is absolutely necessary to reduce the opportunity for attack. But breaches happen from time to time, and that\u2019s where new technology is required.<\/p>\n<p>We concentrated on one particular goal whilst we were developing our <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/anti-targeted-attacks?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti Targeted Attack Platform<\/a>. We knew it is important to merge proven anti-malware technologies, advanced new methods of statistical analysis, and machine learning to spot the tiny bits of online communication that belong to cybercriminal activity. No security expert is able to control everything, so that\u2019s where the machines step in \u2013 controlling every data transmission and analyzing the workflow for discrepancies, and joining different pieces of evidence together to produce a substantiated alert.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>There are million\u00a0ways to breach the network perimeter. #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2cec&amp;text=There+are+million%C2%A0ways+to+breach+the+network+perimeter.+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>So, if your employee\u2019s PC connects to a previously unknown server in a distant country, it might look suspicious. But it might also be a false positive. What if this happens at 3am, when no one is in the office? Did it previously download an unknown executable? Now this is the time to call security.<\/p>\n<p>When a business tries to protect itself from targeted attacks, it finds itself in a harsh environment of many unknown variables, with millions of attack methods on thousands of devices, from routers to\u00a0 mobile phones. The only way to keep up is to collect tons of data and use knowledge about the constantly evolving threat landscape to process it as fast as possible.<\/p>\n<p>This data-driven approach to protecting companies from the most sophisticated and targeted attacks requires a vast amount of industry expertise, balanced with powerful technology. If your automated systems spot a targeted attack, protection requires the skills and knowledge of a professional. Yet that professional\u2019s efficiency relies on how well the attack is documented \u2013 by technology \u2013 at every step.<\/p>\n<p>Last year one fifth of businesses reported a targeted attack, and <a href=\"http:\/\/media.kaspersky.com\/pdf\/it-risks-survey-report-cost-of-security-breaches.pdf\" target=\"_blank\" rel=\"noopener nofollow\">lost<\/a> anywhere from 38K USD to half a million from every incident. So, it\u2019s the right time to take action and combine expertise with advanced technology for the best protection possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it\u2019s not the only one. <\/p>\n","protected":false},"author":2402,"featured_media":15352,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[994,2454,2421,81],"class_list":{"0":"post-5940","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-intelligence","10":"tag-kaspersky-anti-targeted-attack-platform","11":"tag-mitigation","12":"tag-targeted-attacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/targeted-attack-mitigation\/5940\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/targeted-attack-mitigation\/15055\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/targeted-attack-mitigation\/8264\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/targeted-attack-mitigation\/5940\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/targeted-attack-mitigation\/5940\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/intelligence\/","name":"intelligence"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2402"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5940"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5940\/revisions"}],"predecessor-version":[{"id":33731,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5940\/revisions\/33731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15352"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}