The key to detecting, fighting and eradicating cyber-attacks is to first know the attackers are there. The
knowing requires a security first methodology. This means that security is a keystone component of
designing, building, managing and using our systems. Our architecture and systems are designed first to
prevent intrusion. But, no matter how sophisticated infrastructure is, attackers will eventually find
a vulnerability. The understanding of this is key to a successful defense.
At CloudSpace, we use a sophisticated SIEM system (Security Information and Event Management)
to analyze, detect, and track security threats so we know in minutes or seconds if an intruder has
penetrated our infrastructure. We clearly identify anything that has been touched by malware or an
intruder. CloudSpace has a policy of destroying over clean. We destroy and rapidly rebuild any
infrastructure component touched by an intruder or malware.
The user endpoint is the most vulnerable point of attack. Eventually some users will click on something
that gets past your initial defenses. Most organizations are not prepared for a sophisticated attack such
as Zero-Day with ransomware. But, this type of attack is becoming the norm.
When your organization is hit by a cyber-attack that includes ransomware, it is rarely a random event. A
sophisticated cyber-attack requires days, weeks or even months of planning after the first malware
enters your organization and before the ransomware attack is launched. The ransomware attack is the
final stage of the cyber-attack initiated after the attackers have stolen or compromised everything of
the value they can find.
After your system is compromised, the attackers evaluate your security, identify you’re potentially
valuable data and read volumes of email before they determine if anything of value can be obtained.
By the time the ransomware is detected, the attackers have secured what they see as the most valuable
material and established their end game. Once all your data are encrypted by the ransomware, the
network is crippled and of no use to the attackers.
CloudSpace designs build and manage cloud and ground-based network infrastructure focusing
on security first. Does your infrastructure team?