Is Your Security Military-Grade?

  /     /     /  
Publicated : 22/11/2024   Category : security


Is Your Security Military-Grade?


Simple civilian security wont cut it for most businesses. Its time to take your cybersecurity mil-spec.



Most companies and individuals in the developed world have very little knowledge of advanced military tactics. We dont need that knowledge in our daily lives. The rise in state-sponsored cyber crime is changing the calculus when it comes to knowing advanced hacking techniques. And most of us have a lot to learn.
Think about it: Do you know what the four Fs are in small-unit tactics? If someone asked you to quickly set up a Fire Trap, could you do it? Unless youve recently served in the military or are prepared for civilian action on at a very high level, the answer is probably no. The good news is that most of us can live happy, safe lives while remaining ignorant of those and many other tactical topics.
Even if your job involves physical security for a business the liklihood is great that youll never be required to know vertical envelopment or the applications of
motti
. The differences in civilian and military needs and tactics are just too great.
In the world of cyber defense, though, there is only a small difference in the tactics used by criminal hacking groups and those used by nation-state hackers bent on economic disruption. Weve seen this sort of tactical similarity in recent ransomware attacks that focused their damage in Europe and in very targeted attacks on civil infrastructure in Ukraine.
So what do you need to know if youre going to avoid becoming a casualty of this latest war? First up is figuring out how to keep up with new information. US-CERT should be on your daily update list. In addition, there are several mailing lists and bloggers that should be hitting your in-box at least once a day.
Authors Note: Which security writers and lists do you look to for info? Id love to know your favorites -- please let me know in the comments!
Next, you must understand what the warnings mean.
When a researcher puts out information on a new vulnerability, dig into it and follow the code. Look at the services and apps that the vulnerability hits and immediately start the process of understanding whether your enterprise applications depend on the affected services. Talk to your best security people and get them to explain exactly whats happening. Youll probably find that most of your security folks are eager to share their knowledge with someone who comes asking genuine questions to which they really want to know the answer.
Finally, convince your executives that youre not too small, too insignificant, or too obscure to be a target. One of the things that weve seen is that many attacks use shotguns as an analogy -- their pellets of destruction spread all over the landscape. Being prepared means keeping up with backup and recovery routines, having an up-to-date business continuity plan and yes, practicing both to make sure you know that they work.
Security isnt easy and it may not be cheap. But in the second decade of the current millenium its far cheaper than repairing the damage that can come from a military-grade exploit launched against your company.
Whats your plan? Are you worried about the escalating danger? Or has your business gone back to abacus and quill pen to escape the cyber danger? Let us know -- its a story that involves all of us.
Related posts:
Bad Rabbit Breeds Ransomware Fears
A New BotNet Is Growing: Are You Already Part of Its Army?
Financial Institutions Lack Confidence in Their Own Defenses
— Curtis Franklin is the editor of
SecurityNow.com
. Follow him on Twitter
@kg4gwa
.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Is Your Security Military-Grade?