Story image

Cyber criminals too smart for firewalls & virus scanners - here's what you need

13 Nov 17

Of course, you want to protect your assets from cyber threats as much as possible.

That’s a no-brainer.

However, studies show that businesses have work to do when it comes to applying preventative security measures, especially as cyber criminals are becoming smarter in developing and releasing digital threats.

A 2013 study by 41st Parameter found that two thirds of internet users have been victims of cybercrime, with more that 1.5 million new victims every day.

And the risk of cyber-attacks increases with the use of mobile devices, which have, with the rise of IoT, mobile, and flexible workforces, become a standard part of doing business.

Moreover, the Trusted Mobile Index surveyed 4000 participants across the U.K., U.S., Germany, China and Japan and discovered that 41% of respondents are using personal devices for work without permission.

This same report showed that one third of IT professionals work for a company that has already experienced a mobile-related security threat.

Basically - most companies do not have network security covered as well as they think.

And with security breaches costing businesses on average $7.2 million per incident, according to data from the Ponemon Institute - it’s about time all companies review their security strategy.

So, what needs to be done to prevent your company from becoming a statistic?

Or if you have already been a victim, how do you ensure it never happens again?

Companies tend to believe their infrastructure is protected by a firewall and an up-to-date virus scanner.

But cyber criminals are becoming more sophisticated in the way they access your company’s servers and computers - so a firewall or virus scanner alone is just not going to cut it.

Some security programmes might only detect worms and Trojans after the threat has accessed the computer - which is too late. Once a threat has access to one computer in the network, it’s typically only a matter of time before the entire system is under threat.

What happens next? Think data manipulation and loss, the takeover of computing capacity for criminal purposes, and business communication between company locations, order process and customer communications completely halted.

Now, the administrator needs to figure out what is the source of the problem, what components of the security system have failed and which areas have been attacked by malware.

To avoid expensive incidents like this - which have a disastrous impact on business - the entire IT infrastructure must be protected.

This involves the firewalls and virus scanners, but also includes other measures such as encoding software, data security software, content filters and port scanners.

But to guarantee complete network protection - network monitoring must be included as a supplementary security measure on top of all these other layers.

Network monitors typically work by allowing IT departments keep track of the entire IT infrastructure - including all devices and systems.

This means IT managers can monitor everything that uses a defined interface and delivers status information via a standard protocol. To do this, the software must establish contact with the device or service using an IP address and from there it can retrieve the current device status.

In a recent survey by Paessler AG, 1200 users were questioned about the application software PRTG Network Monitor, and the results were undeniable.

75% of respondents named PRTG Network Monitor as a crucial security component of their networks.

Paessler’s PRTG Network Monitor is the leading solution that allows IT departments to monitor every area in the IT infrastructure - including LANs, WANs, websites, applications, servers and devices - at a glance - and at all times.

PRTG can scan network segments by pinging defined IP range. This way PRTG will automatically recognize a wide range of devices and systems and create sensors from predefined device templates - saving you time and allowing you to starting monitoring straight away.

Everything you need to get started is contained in PRTG.

So what are you waiting for?

To get started with PRTG networking monitoring to guarantee your networking is secure, get the trial

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Cohesity signs new reseller and cloud service provider in Australia
NEXION Networks has been appointed as an authorised reseller of Cohesity’s range of solutions for secondary data.
The key to financial institutions’ path to digital dominance
By 2020, about 1.7 megabytes a second of new information will be created for every human being on the planet.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
NVIDIA sets records with their enterprise AI
The new MLPerf benchmark suite measures a wide range of deep learning workloads, aiming to serve as the industry’s first objective AI benchmark suite.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.