+1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Avoid being the next victim of cyber crime

Written by Joseph Carson

May 17th, 2016

Every advanced persistent threat uses application vulnerabilities and privileged accounts to gain access so they can reach their target and carry out fraudulent or malicious activity.  To mitigate against these threats means getting visibility on who has privileged access and which systems pose the highest risk that can download and install applications from the internet without proper security controls to prevent you from being the next victim of cyber-crime.

o    Discover and reduce privileged users/accounts

o    Before allowing applications to install or execute check if it is safe

o    Continuous protection and detection against cyber threats

Cyber threats are real and everyone is a target.  No one is excluded and you must take action to understand what these risks are and how they impact your business.  Cyber security awareness and training should now become mandatory to anyone who is operating computer resources or technology that is critical to business functions.  The biggest threats today are targeted phishing and advanced persistent threats that target valuable assets of an organisation and they use multiple hacking stages in order to carry out their work.  These stages include:

o    Reconnaissance

o    Gaining access

o    Pivot building

o    Privilege escalation

o    Maintaining access

o    Malicious activity

o    Covering tracks

Reconnaissance is a stage for learning as much about the organisation as possible with information that is already available on the public internet.  Gaining access typically uses targeted phishing attacks or known vulnerabilities in systems and applications that allow an attacker to gain access and get through the perimeter security defenses followed by discovering the network.  The difference between a low severity breach and a high severity breach is the privileged account that has been compromised.  The privilege escalation stage of the attack determines how damaging a cyber breach will impact the organisation; this is the difference between compromising a single device or users credentials and the entire organisation.  Once a privileged account is compromised the attacker can carry out the next phases of the attack to maintain access, carry out fraudulent activities, ransomware, stealing sensitive data or malicious activity.

Thycotic can help organisations protect and detect against these cyber threats by mitigating gaining access, system vulnerabilities, discovering and mitigating privileged accounts and making maintaining access more difficult for an attacker.

Learn more about how Thycotic can help your organisation mitigate against cyber threats by starting a free trial today.

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS


The following two tabs change content below.

Joseph Carson

Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.