<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

2016 Security Breaches: The Reality from the Predictions

February 23, 2017

At the beginning of 2016, I warned of key security threats that the world would face in the coming year.

As I look back at those predictions, I realize that there are still critical insights to be gained from the numerous attacks that occurred last year.

Read on to gather the lessons learned. 

 

Control Systems Present New Vulnerabilities

As industrial networks move from closed, analog systems to connected, Ethernet-based solutions provide new opportunities for cyber-attack. In the rush to revamp smart grids, manufacturing facilities and automated control systems, I feared security often became an afterthought. Last winter, attackers overwrote firmware on critical devices at 16 Ukrainian power substations to leave 230,000 residents in the dark. Another group gained access to the UK rail computers that ultimately controlled the trains and track signals. While this breach seemed to be more exploratory than disruptive, it illustrates the dangers inherent in this type of attack vector. 

Clearly, vendors are going to have to do a better job of redesigning security appliances to protect assets in these environments. 

How to Guide: Optimizing Network Design in Security Projects

Data from Minors will Become a New Focus

This demographic is particularly vulnerable to attack. Having grown up in the digital age, they have no fear of divulging information online. Because they aren’t old enough to worry about credit, they would never dream of checking it to see if they’ve been compromised.  

After the attacks on UC Berkley and the University of Central Florida, over 143,000 records of students, alumni and staff were stolen. And who knows how many of the 1 billion hacked Yahoo accounts belonged to under aged subscribers. 

Going forward, I expect the rise of connected toys to present new vulnerabilities as hackers look to extract data for long-term use. Parents, vendors, service providers and educators will all have to do a better job protecting minors from being exploited.

State-Sponsored Terrorism is on the Rise

In 2015, we saw a new set of bad actors enter the stage – ones not motivated by greed but political gain. The Russian involvement in the US presidential election is the ultimate proof of how cyber-attacks can impact global events. Of course this story completely overshadows FireEye’s assertion that Chinese cyber espionage attacks on the US have declined over the last years. 

If state-sponsored attacks continue to go unpunished, I expect these groups will become bolder in 2017 and beyond.

Establishing Traffic Baselines are Critical to Preempting Losses

Understanding what normal behavior looks like and continuously comparing current activity to that standard is critical for detecting both large breaches and the small anomalies that betray advanced persistent threats (APTs). This type of analysis could have helped organizations such as Verizon, Yahoo, AT&T and others realize that massive amounts of data were being copied and/or exported from their systems.

Looking back on the year, it seems as if everyone’s worse nightmares for 2016 were realized. A recent Bitdefender report found that one third of US companies were breached last year – and nearly 75% didn’t know how it happened. More than 4 billion records were stolen around the globe including the 19+ million US social security numbers that were compromised in the process. 

To preempt security challenges in the coming year, my 2016 recommendations still hold true:

  • Visibility is critical to detecting, identifying and remediating breaches as quickly as possible
  • Anchoring security appliances with a network TAP is the only way to guarantee that they see 100% of the network traffic

Don’t let cyber-criminals steal your assets, ruin your reputation or comprise hard-won customer relationships.  Mitigate risk with tips from our latest paper, Optimizing Network Design in Security Projects.  Download it today.

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES