July 11, 2016
Joe Franscella

7 Threat Intelligence Facts For Protecting Data

<p>Online security is an integral part of keeping our worlds in order, both at the office and at home. These seven facts illustrate the ever-growing need for threat intelligence.</p><p>1 - <strong>Hacking instances are increasing among SMEs.</strong> There was a time when only certain types of businesses considered themselves probable targets for directed hacking attempts. Before open source threat intelligence was introduced, security was insufficient for many small and mid-sized businesses. They don’t find themselves big enough to have a powerful IT team, yet are large enough to possess assets that cyber-criminals find worth pursuing.</p><p>2 - <strong>Simple tactics are still effective for gaining access to a company’s infrastructure.</strong> Cybersecurity solutions are becoming more and more nuanced; however human error has remained a constant. Phishing emails are still very effective tools for gaining a foothold into a network. Hackers identify a target and send emails every day until somebody is tricked into “taking the bait”, i.e. clicks a link to a malicious domain, download executable files, or install malware which steals login credentials. Phishing tactics work so well, targeting 10 employees <a href="http://www.insurancejournal.com/news/national/2015/04/14/364191.htm" target="_blank">works 90% of the time</a>.</p><p>3 - <strong>Protecting your digital assets extends past your computer network to your social media presences.</strong> If login credentials are compromised, your account can be hijacked with disastrous results. Spammers and other detractors have been known to penetrate social media accounts, change the passwords, and begin posting harmful content. Some hackers send out spam ads, others use the platform to <a href="http://www.jeffbullas.com/2013/07/12/7-examples-of-what-happens-when-your-twitter-account-is-hacked/" target="_blank">air grievances or perpetuate pranks</a>.</p><p>4 - <strong>The call is coming from inside the house!</strong> Some security <a href="{page_3248}">incidents occur from within</a>, and not as a result of user error. For example, when workers are laid off temporarily and allowed to keep access privileges - a perfect storm for malicious insider behavior. Disgruntled employees have been known to extract revenge by revealing company secrets or give access to hackers who go on to pilfer or to sabotage the company’s assets. Others intentionally steal proprietary information as they leave to work for a competitor.</p><p>5 - <strong>Your smart devices have created a new class of vulnerabilities</strong>. The <a href="https://www.anomali.com/blog/how-the-internet-of-things-will-affect-the-role-of-analysts">Internet of Things</a> refers to communications between non-traditional web browsers. Objects that operate using wifi like smart TVs and text-enabled appliances can be overtaken and used to propagate botnets which send spam or perform DDoS attacks.</p><p>6 - <strong>Employees working from home create security challenges.</strong> Many of us telecommute or are expected to answer emails after-hours and so we log in from home or public wifi. Passwords can be captured or malware can easily be introduced into your network from an infected home computer or hacked mobile device. These realities must be accounted for in your cybersecurity strategy. There are two approaches to this challenge: either you must decide the risk of threats coming in via employees’ home computers outweighs the benefit of evening emails and eliminate after-hours logins, or acknowledge home computers as an extension of your security territory and work out means for safer access.</p><p>7 - <strong>There is usually time to respond before a threat occurs.</strong> Large scale data breach events sometimes seem to occur overnight, but in reality, they take weeks or months. On average, 100 days pass between the first initial exploratory maneuvers and the hard blow of the hackers’ attack. Detecting suspicious behavior with a <a href="{page_3451}">threat intelligence program</a> gives you notice that someone is up to something while there is still time to protect data.</p><p>Awareness is the most powerful tool we can wield against hackers. Keep up on cybersecurity news and you’ll automatically gravitate towards good policies.</p><p>Intelligence is becoming the cornerstone for security. Organizations large and small are making threat intelligence a part of their day-to-day security operations, but variations persist, hinting at blind spots that will need to be addressed.</p><p>This market guide is the product of surveys and interviews with over 300 IT professionals and provides insight in purchase and use activities for both small and medium sized businesses and large enterprises. See your organization through the lens of this important survey.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-fda943c5-9d10-4128-b771-479fea367310"><span class="hs-cta-node hs-cta-fda943c5-9d10-4128-b771-479fea367310" data-hs-drop="true" id="hs-cta-fda943c5-9d10-4128-b771-479fea367310" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="https://www.anomali.com/resources/whitepapers/market-focus-employing-cyber-threat-intelligence" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=841be726-533d-4f0f-86da-0338d3986fb1&amp;placement_guid=fda943c5-9d10-4128-b771-479fea367310&amp;portal_id=458120&amp;redirect_url=APefjpEmkczkhzE8Wnj6ukeV7CKrmLci0boGIZ-Y6jAZCslcKI8rvIToTpqUdfzA7PtLuZ4wO7TR4m5P6jNVj3f9nvrMaTG3bUdbgRJkInfYplYnp-SsvRqGebFut7gM12s_mfY3sBlj4Z4Wsgsh1kV_-st9b0trhN_QN-ck7usVBRkuHXpjth6ZDzhYF471OluGwjrLGDQL6xGAdmyvz_5JNOKromogunpufT3onOox7QFOtQ2uejHOAJlbKxmPuXyrHomjPKrLc9tqpHY3h_hkV5viB1NqvJdHvJicYnN8WTFHx-qpcPZD-Jt9eu_oaR28WZ5sHV-XpmMdf5HqKdyBINQYD1szXQ&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fthreat-intelligence-facts-for-protecting-data&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fthreat-intelligence-facts-for-protecting-data&amp;pageId=4239036602&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.87.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_841be726-533d-4f0f-86da-0338d3986fb1" style="margin: 20px auto;" target="_blank" title="Get The Survey Here">Get The Survey Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'fda943c5-9d10-4128-b771-479fea367310', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.