He added, “We have gone beyond the typical MDR service provider and provide managed, prevention, detection, and response. We now provide Attack simulations, Virtualized Attacks, Penetration Testing and Disaster Recovery Services from ransomware. “
With the pandemic and the lockdown, there is one thing that has had the maximum impact on our psyche: working from home. Outside the controlled environment of offices lined with secure networks, finding the right security software for businesses was fairly simple. With remote working being the new normal, cybercrime poses a great threat to organisations and business continuity.
Mitama says that amidst the pandemic, a large portion of the economic meltdown arises from cybercrime. “Cybercrime has existed even before the pandemic and economic meltdown, but right now, we could say companies are becoming more vulnerable and attractive for attackers because of the new work from home strategy most are implementing. With employees taking their work devices out of their company’s perimeters, security efforts, like firewalls, no longer guarantee the security of their data, making breaches and cyberattacks ever more prone. To this we could also add the lack of awareness many companies have, thinking they will not be a target is more common than imagined.”
The cybersecurity landscape is due for a much needed upgrade. “The cyber security landscape has proven that we will live in a borderless technology society which will cause deeper security issues that transcend current security controls, strategies, and budgets. The depth of new attacks will begin to bring networks to their knees, compromise and breach will be far more prevalent and having a strategy such as 3D Dynamically Defined Defense will be the bridge to the future of countering these attacks and intrusions.”
But, what are some challenges that modern day businesses must acknowledge and prepare to fight? Both, the business model and the current status of the business play a huge role in determining the pain points and therefore the plan of action.
“No network is the same and every threshold is different, so we could not generalize on the challenges, but we could advise companies to strengthen their security effort. Maybe we could delete the space between this paragraph and the next one that starts with “Learning about the threats. Learning about the threats, they are exposed to will allow them to see and understand the best ways to prevent an attack. We could always provide an assessment to see what your current gaps are, show you how to prevent unnecessary risks and offer monitoring services to provide greater security.”
The question that arises is what are some necessary precautions that every business must take to avoid cybercrime? According to Mitama, “Companies could start by establishing confidentiality and digital management rules, strengthening credentials and data access, updating software, apps and devices, applying encryption to email, guarding passwords and vulnerable information, having a response plan ready to be executed if something happens, not opening unknown or suspicious links, backing up their data, using firewalls and antivirus and training employees on possible threats, so they know what to do in different scenarios.
He adds, “Implementing attack simulators is also a great option, and it is something we offer. It’s not an overnight achievement, but knowing who clicked when and how will allow you to understand how to act when an attack occurs and create a strategy to prevent it from happening in real life.”
THETA432 is all set to scale their product, Advanced Virtual Attacks (THETA432 A.V.A.) “With this product and service, we can simulate attacks, virtualize phishing campaigns with the ability to redirect end users to a learning management system, so they can learn about phishing emails.
Among other things with AVA we can emulate various APT groups to identify gaps in the MITRE ATT&CK framework and assist our clients in hardening these areas from being exploited.”
THETA432 DRX backs up the end user’s work product in the event of a ransomware attack. “The software is aware of anomalous behavior and this behavior is sent to our SOC team for evaluation and identification.”
An advanced plan of action needs an in-depth analysis of a wide range of parameters. The pandemic has added quite a few to the equation and complicated it. Clearly, organisations who have favoured the principle of “talent knows no geographic and time zone boundaries” are the first to excel.