Intelligent CISO Issue 02 | Page 63

“ But along with these advantages come risks , especially for companies that are not building BYOD into their security strategies . Firewalls and IPS devices protect the edge from incoming threats but these attacks have advanced from exploit-based threats to targeted , hidden malware that stealthily steals private data and intellectual property .
Bryan Hamman , from Arbor Networks
“ With each new device that plugs into the network comes another portal for potential distributed denial of service ( DDoS ) attacks and another distribution line through which these attacks can extend their reach .”
Mark Campbell , Consulting Engineer for Sub-Saharan Africa at Arbor Networks , has previously explained the intricacies behind cyber and DDoS attacks .
He notes that modern day foes do things that can ’ t be stopped purely with technology . For instance , they do their reconnaissance in a human way to understand your technologies , processes and people . They will use social media to understand your staff , affiliates and partners , watch for press announcements about your technology upgrades and will then rent the equipment to craft and test their attacks .
“ This is incredibly sophisticated ,” added Hamman . “ Gone is the concept that cyberattackers are bored teens sitting on a LAN in their grandma ’ s garage trying to cause trouble . These attacks are planned and launched with intention . They are out to do as much damage to your infrastructure and access as much sensitive data as they can in as short a time as possible .”
The first step in the BYOD journey – for companies who realise employeeowned devices on the intranet is a nonnegotiable – is to have a clear policy on what is and what is not allowed , as well as the expectations of the business in terms of security . These policies need to be clearly communicated to employees and security measures and
Gone is the concept that cyberattackers are bored teens sitting on a LAN in their grandma ’ s garage trying to cause trouble . These attacks are planned and launched with intention .
practices must be detailed with training , where necessary .
“ Isolating BYOD devices from high-value systems is also recommended , but in a way they can be used for day-today activities while enforcing stricter permissions to use other , more business critical , resources ,” says Hamman .
“ The most important consideration of all , however , is knowing that you can ’ t find
what you can ’ t see ; solving business issues begins with network visibility ,” he adds . “ Rather than providing visibility and intelligence only at the vanishing enterprise perimeter , a BYOD empowered business must demand pervasive visibility throughout the enterprise and its linked devices .
“ By seeing the threats throughout the network , enterprises can detect new threats and stop them using the right tools . It is an enterprise wide belief , at Arbor Networks , that the days of just stopping the threat without context or analytics are over ; visibility and security intelligence are key .
“ Enterprises can protect the business with solutions that enable in-depth visibility into network , application and routing traffic while offering DDoS detection , mitigation and reporting capabilities .
“ Lastly , the solution of choice should be extremely scalable , easily deployed and appropriate , whether the business is a small hosting provider with a single data centre or a large cloud services provider with multiple data centres and extensive network connectivity .” u
intelligent MOBILE SECURITY
www . intelligentciso . com | Issue 02
63