Ransomware Rocks Endpoint Security Concerns

  /     /     /  
Publicated : 22/11/2024   Category : security


Ransomware Rocks Endpoint Security Concerns


Meanwhile, threat detection technologies are evolving that can help security teams spot incidents more efficiently.



INTEROP ITX - Las Vegas - The WannaCry attack campaign was top of mind here this week as industry experts and enterprises say that was only the beginning of ransomware threats yet to come.
Ransomware is one of my biggest concerns and my users knowledge about opening bad attachments, says Dan Tarnowski, IT manager at CCMA LLC. 
Tarnowski noted that while ransomware is one of his biggest concerns, his organization has been fortunate to have avoided this threat so far.
The 
high-profile WannaCry ransomware attack
 was the largest such attack to date, infecting hundreds of thousands of machines in some 150 countries. 
Last year, ransomware was a major driver of endpoint sales for the $9.5 billion market that includes several hundred endpoint security vendors from startups to major players like Symantec, McAfee, and Trend Micro, says Rob Westervelt, a security research manager at IDC.
CIOs would say, why were we hit with ransomware and it wasnt detected, says Westervelt.
Westervelt and other security experts expect ransomware will continue to loom large as a threat to endpoint machines. Indeed, the FBI is forecasting ransomware could cost victims $1 billion a year, according to a CNN
report
.
Other major threats landing on the endpoint that will loom large in the future include more advanced persistent threat (APT) attacks, where an attacker gains access to the network and lays low and undetected for a long stretch of time to pilfer data. APTs are typically associated with nation-state threat groups.
APT attacks tend to target large organizations and often use social engineering in emails to lure the user to provide access via clicking on a link or downloading an attachment, says Michael Canavan, senior vice president of Kaspersky Lab North America.
They may spoof an email that looks like a LinkedIn connection request, and the user will download malicious code onto their system and the user will not even know an APT is now on their system, Canavan says.
Not only are ransomware and other advanced threats a growing issue for the endpoint, but the rate of new iterations of these attacks and others hitting the endpoint has vastly accelerated, says Michael Spanbauer, vice president of security test and advisory for NSS Labs.
Over the last ten years, the pace has accelerated immensely. Its like going from a Model T to driving a McLaren at 200 mph, Spanbauer says. But the good news is innovation and security people have gotten better, too.
Threat Detection Evolution
Most ransomware attacks could be avoided with proper patching, backups, and other basic security hygeine. Meanwhile, emerging technologies for endpoint security such as machine learning could help security teams better and more quickly react to incidents and breaches, say security experts.
Were now hearing a lot about machine learning, says IDCs Westervelt. Were hearing about stronger threat detection engines that can improve over time with machine learning looking at files.
Machine learning is rapidly being adopted or in testing phases at organizations, with over 50% of companies big and small likely to fall into either camp in the next year, predicts Stuart McClure, CEO of Cylance, an endpoint security vendor.
Machine learning takes data sets, learns from them, and gets the visibility to detect where the threat came in from, where it is moving to, correlate with other past attacks and conduct similar action as a security analyst, for example - but much faster than a human.
Some experts consider machine learning a narrow form of artificial intelligence (AI). AI proper can determine and consider various actions it can take with the information it has gleaned, similar to the way humans think.
McClure says that roughly 80% of the companies he runs into around the world want to leverage AI in some form around the endpoint. And of this group, half of the companies want to replace traditional signature-based anti-virus technologies right away and the other half want to do it over time.
The larger companies are strapped with so many layers of protection that it will take more time to figure out where AI fits in the stack, but mid-market to smaller enterprises with 150,000 to 200,000 nodes and below can adopt cutting-edge technology more quickly, McClure says.
IDCs Westervelt notes that although many endpoint startups have launched out of the gate with signature-free detection technology that was based more on users behavior, many are now adding signature-based detection engines to their products.
The vast majority of threats are known threats, so why put extra pressure on your sandbox to test potentially malicious software based on its behavior, Westervelt says.
And in the meantime, traditional signature-based anti-virus vendors have added signature-free security software to their offerings. As a result, Westervelt says, there is less and less differentiation between new and shiny startups and the old guard.
A recent US survey of 253 small-to-mid-size IT managers and directors found that 53% noted price was the top factor in endpoint security purchase decisions, and just 21% cited ransomware in playing a role in their decision to acquire endpoint security technology, according to a 
survey
 conducted for VIPRE.
There are a lot of good products on the street, but my issue is finding the appropriate product, says Stefan Rettig, an end-user platform consultant and attendee of Interop ITX.
My priorities in the end-user space is threat mitigation, he says.
Related Content:
Thank Ransomware For Next-Gen Endpoint Security Momentum
3 Tips for Updating an Endpoint Security Strategy
The Rebirth Of Endpoint Security

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Ransomware Rocks Endpoint Security Concerns