Page 3 - Threat Intelligence 12-20-2019
P. 3

Perspective:




           State of the



           Marketplace





           As the year winds down, most of the news stories published by our
           monitored threat feeds are centered around the “year in review” which

           may be why many of this week’s stories are more strategic in nature.
           However, one trend you will be noticing is the number of successful
           cyber attacks. Every week there are more stories of successful breaches
           or stories of schools and even cities crippled by ransomware. The bad
           guys are following the trends, and following the money.       Good IT

           directors will be watching the trends as well: trying to learn from the
           failures of these organizations.  This type of “opposition research” is
           critical for all IT organizations to perform regularly. As your team “what

           are we doing that is different?” Be prepared for the answers, which
           may not be to your liking. Also, make sure you take into account your
           users – they are, and always be, your weakest link.




           New Years day may bring with it some headaches for organizations that
           do business in California. On January 1, the new California Consumer
           Privacy Act of 2018 (“CCPA”) goes into effect. It is a significant piece of

           legislature with a growing set of enforcement rules. It is imperative that
           you are prepared for it’s implementation and know what steps you need
           to take to comply.




           A recent study found that zero day malware accounts for 50% of

           detections collected across all systems. This is significant because if
           your security controls cannot prevent malware from moving up the
           Cyber Kill Chain, then you have greater exposure. Overlapping security
           controls, OS and Application Hardening, and anti-malware systems that
           dynamically update (and/or use heuristics) are key elements at

           preventing attacks that use zero-day exploits.                                             3




                                                                     ~Stay Secure




                                                    www.accumepartners.com
   1   2   3   4   5   6   7   8