Posts tagged data security
An Endpoint Protection Platform (EPP) is an enterprise solution typically comprised of capabilities such as port and device control, a local firewall, and anti-malware software. One of the things which most strongly characterizes an EPP is its ability to provide anti-malware scanning, based on detection methods which rely on known signatures, in other words antivirus software.
Advanced Endpoint Protection Platforms
Some EPP platforms go a bit further than this, providing detailed monitoring of endpoint file activity, as well as the detection of suspicious or malicious behavior from such files, which may be completely missed by other layers of security. Going one step further, when this kind of suspicious activity is detected, some EPPs even provide the means of managing it.
This can be an extremely important part of any security system. The truth is that it’s impossible to be 100% protected from malware attacks, and some will break past your firewall and your antivirus software. When they do, having such monitoring of file activity on your endpoints can provide just the kind of alert that you need to spot an attack, before malware has a chance to do any serious damage.
What is Endpoint Detection & Response?
By contrast, Endpoint Detection & Response is a security system comprised of at least four major capabilities:
- the detection of security incidents
- the localization of any incidents right there at the endpoint of detection
- the ability to conduct a full investigation of any potential security incidents
- and the restoration of endpoints to their original status prior to infection.
From this it can be seen that the difference between EPP and EDR is that EPP tends to be more of a front-line defense and EDR tends to be more of a second or third line of defense. While the hope is that any Endpoint Protection Platform will detect almost all malware attacks, the EDR security provides many more tools for managing attacks which have been identified, and have already been carried out to at least some extent.
Hybrid EPP and EDR Systems
It was inevitable that security vendors would develop a package that includes elements of both an EPP and an EDR system to provide the ultimate security system. The market for such products is definitely there, because there are many small businesses and large corporations which have woken up to the dangers of ignoring security, and have now swung their security pendulums entirely to the opposite side.
You can never have too much security in place at an organization, and anything which provides a full toolkit of options is a good idea when it comes to security. For that reason, some companies now provide hybrid systems which include features of both an EPP and an EDR, so that threats can not only be identified, they can also be dealt with right on the spot.
Here are some of the features you might find in a hybrid security platform:
- threat identification using signature-based methods
- ‘sandboxing’ capabilities that perform on-the-spot analysis of files against hundreds of known behavioral indicators, to detect suspicious activity
- malware detection and blocking, using techniques such as signature matching and fuzzy fingerprinting at the endpoint prevent network breaches
- when potentially harmful files slip past the front line of defense, the secondary features can be invoked. That means a continuous analysis of files that enter the network, regardless of what their status is. If later analysis should indicate suspicious behavior, an alert can be sent to the security team, along with the recorded history of file activity thus far. Your team will have a full understanding of where such files came from and what it’s been doing once it entered your network. You’ll then also have the capability of controlling it and deciding what to do with it.
Which is Best for Your Enterprise?
Deciding which approach your company should take to protecting its valuable data assets and network infrastructure will depend on a few things – but one of them should NOT be that you’ve been immune from attacks in the past. That’s the kind of mindset which can easily make your company next on the list for a harmful cyberattack.
Instead, you’ll probably have to take cost into consideration, especially if your security budget is somewhat limited. Then too, you should consider the offerings available from a short list of vendors which you’ve prepared, or which you have been advised about by a security consultant.
Don’t forget to take into account what you already have in place, so that you won’t have to gut the system and completely replace it. Whatever you end up with, make sure to use all the information provided to you, keep it as current as possible, and back up your data files.
A study recently conducted by RiskVision, a respected developer of Risk Management software, determined that more businesses today are concerned about company reputation than they are about potential breaches of security which might impact them. It has long been known that companies consider a brand name to be one of their most significant assets, even though it’s an intangible that has value to no one outside the company itself.
In this survey, damage to a brand name was considered to be potentially more damaging than security breaches, even though the two often go hand-in-hand today. Hackers who successfully penetrate into a company’s computing network often do inflict serious damage to the reputation of the business, and subsequently its brand name. It should, therefore, be kept in mind by all business owners that security breaches need to be taken seriously, to prevent damage to the company brand-name, as well as all the usual financial ramifications.
How a Security Breach Can Damage Your Brand Name
Typically, the first thing a customer considers when thinking about brand names, about products or services, is whether or not the product or service provides quality and value, and whether the cost is in line with the levels of quality and value delivered. However, any company which has suffered a known security breach often falls into an entirely different frame of evaluation.
Consumers will often think that any business which has allowed itself to be hacked by criminals is not worthy of their trust and patronage. After all, if their business practices were lax enough to permit the cyberattack in the first place, that may be a sign that other important aspects of the business are also conducted with inadequate attention to detail. This fact is borne out powerfully in a poll jointly conducted by CSO and OnePoll, which attempted to determine the connection between insufficient security and a company’s brand name, as perceived by consumers.
In the survey, a whopping 86% of customers declared that they were unlikely to patronize a company which had suffered a severe security breach, especially if the breach was related to customer information. This represents a definite shift in consumer thinking from the early days of cyber attacks when businesses were perceived as victims entitled to understanding and sympathy from the public. In the now-famous cyberattack against department store giant Target, sales for the entire quarter after their security breach dropped like a rock, falling almost 50% from the prior quarter.
Impact of Security Breaches on Small Businesses
Major security breaches perpetrated against small companies can have an enormous effect and can cause irreparable brand-name damage from which recovery is either very difficult or downright impossible. In 2016, a study was conducted by KPMG which determined that almost 90% of small businesses had suffered serious brand name damage in the immediate aftermath of a security breach.
In a white paper published by the National Cyber Security Alliance, figures were released which showed that as many as 60% of all small businesses completely collapse less than six months following a significant cybersecurity breach. Interestingly, both of the studies referenced above reported that less than one-quarter of all small businesses considered cybersecurity to be a top priority. The fact that there has historically been relatively little concern about cybersecurity breaches may account for the often devastating impact that attacks have had on those business entities.
Taking Steps to Secure Your Business
A cyber security plan doesn’t need to be especially elaborate, and it doesn’t need to be funded to the hilt, with every conceivable kind of virus detection software. There just needs to be a well thought out plan for cybersecurity, and a legitimate effort to enforce that strategy. There are some straightforward but very cost-effective measures which can be adopted to thwart the vast majority of cyber attacks.
Using strong passwords on all company computers is a good start, followed up by installing security software on company devices. It’s always best to keep hardware and software updated with the latest available security patches and to periodically back up business-critical data. The weakest point of any company’s network should not be overlooked, which means employees need to be educated about the risks of cyber attack.
The important thing to remember about any cybersecurity policy is just to implement as many of the simple steps listed above as possible and to do it immediately so that your system is not left vulnerable to penetration by cyber attackers. As some of the survey results mentioned above make clear, every kind of business from the corporate giant on down to the mom-and-pop retail outlet must take all steps possible to avoid the possibility of major security breaches. Failing to do this can cost you a lot more than money – it can cause irreparable harm to your company’s reputation.
Remotely Erase Data: Deletion with SecureDrives
Remotely erase data: This hard drive will self-destruct in the amount of time it takes to send a text message.
In a world where privacy and security are at the forefront of people’s minds, that’s pretty much what everyone wants to hear. It’s no longer just a thing of spy movies. Thanks to SecureDrives, a tech company based in London, any business or individual can have an external hard drive with a kill switch. They look like a normal portable drive, but all it takes is one text to make the device unusable and unrecoverable.
At a mere two and a half inches, the drive is tiny and easy to transport. You get 128 GB of solid state drive that you can connect via USB. If you prefer an internal hard drive with a self-destruct, it has a SATA II connection as well. It’s the perfect hard drive when you have to store sensitive data.
While a text is by far the coolest way to crash the drive, it’s not the only option you get. You can program the device to self-destruct in a number of ways: if the battery level gets too low (not sure how I feel about that one); if pin code entries are mistyped repeatedly; when the drive is removed from the PC (just don’t forget you have that setting on if you have to move the drive); or if it loses the GSM signal for longer than the amount of time that you set.
So, what does it do? Erase the data, but leave it available for recovery programs? Of course not! It actually destroys the NAND chip as well as the security controller. According to the company, there’s no way to recover the deleted data after this happens.
Super spy tech isn’t cheap, and the ability to remotely erase data goes for over a thousand pounds (which works out to about $1,650 USD). You get the first year of GSM for free. It’s $47/year after that.