Lead Machine Pink 160x1200

Lead Machine Pink 160x1200

iTWire TV 705x108

Thursday, 07 October 2021 11:27

When it comes to malware, think like James Bond and trust no-one

By Jonathan Andresen, Bitglass

GUEST OPINION: Anyone who has ever watched a Bond movie will know that James Bond has a trust complex. Whether it's M, MI6, or a femme fatale – Bond always gets into trouble when he trusts the wrong person (i.e., Vesper Lynd in Casino Royale).

Arguably though, it's his 'trust no-one' instinct that's kept him alive through 25 films.

And much like the omnipresent Spectre, global cyber crime continues to adapt and innovate with lethal effect. The recent spike in ransomware attacks over the past six months demonstrates cyber crime's increasing sophistication.

Thousands of new strands of zero-day malware are created every day, and signature-based protections which rely upon reactive catalogues of threats can't keep pace. Likewise, sandboxing files to diagnose them takes time and can fail to identify sophisticated malware that knows when it is being evaluated.

Without an up-to-date security framework in place, user credentials can be compromised and sensitive data can be stolen whether through internal negligence, such as an exposed AWS S3 bucket, or through malicious intent.

Cloud applications and bring-your-own-device (BYOD) can serve as proliferation points for malware when they are not properly secured. Unprotected personal devices can upload infected files to corporate SaaS applications, which can then spread malware to other devices and connected apps.

That's where Bond's 'trust no-one' approach comes in and why it's so important to implement a zero trust security model.

Unlike traditional approaches where an attacker can exploit cyber weaknesses upon gaining access inside a network segment perimeter, zero trust treats the identity of each user, application, device and data stream as its own independent 'perimeter,' allowing granular access policy enforcement.

As a result, rigorous security enforcement continues even if hackers compromise a corporate network — malware is blocked from traversing between user accounts, devices, applications and networks.

According to the 2021 Bitglass BYOD Security Report 41% of organisations rely on endpoint malware protection for BYOD, an approach that is not ideal for personal devices which are hard to control and manage.

Cloud-based malware protection tools are often a far better fit but are used far less often. Unfortunately, 30% of organisations don't protect against malware for BYOD at all.

Implementing advanced threat protection (ATP) as part of a zero trust SASE architecture is an important step in proactively blocking known and zero-day threats. Artificial intelligence, behaviour-based protections and integrating a choice of best-of-breed vendors such as Bitdefender or Cylance ensure fast and robust threat protection across all types of apps, devices, and infrastructure.

So when you're watching the newest Bond film No Time to Die, think about how different the world would be if we could finally defeat cyber crime – with advanced technology, and a little less trust.

To learn more about Bitglass malware protection watch this short video and download the Enabling Zero Trust for Remote Work brief.


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments