Falsi miti sicurezza informatica Piergiorgio Venuti

False IT security myths: because backup, cloud, firewall and antivirus alone are no longer enough

Estimated reading time: 4 minutes

Introduction

Cyber security has become a major concern for businesses and individuals. With cyberattacks and data breaches on the rise, many still believe that solutions like data backup, cloud storage, firewalls, and antivirus are enough to protect their digital assets. However, these solutions alone are no longer enough to deal with today’s threats. In this article we will analyze why these solutions can no longer be considered adequate and what you can do to improve your IT security.

The backup myth

Data backup has always been one of the pillars of any IT security strategy. Having a copy of your data allows you to restore them in the event of a ransomware attack or malfunctions. However, backup alone is no longer enough in the face of today’s Advanced Persistent Threats (APTs).

APT attacks expect hackers to remain hidden on the victim’s network for up to months, silently exfiltrating valuable data before being detected and neutralized. In these cases, the backup will contain a copy of the already compromised data, making it useless. Also, if hackers’ access is not eliminated, they will still be able to continue accessing the network and newly created backups. It is therefore necessary to integrate backup with active network monitoring solutions to identify and block this type of threat.

The false myth of the Cloud

Cloud storage is often seen as a way to increase data security, thanks to the redundancy and protection provided by providers. However, moving data to the cloud does not in itself improve cybersecurity. The attack surface simply moves from internal servers to those of the cloud provider. Also, the basic security offered by most providers only covers the protection of the cloud infrastructure, but does not analyze the data content for threats.

Encryption and data access policies must be implemented and managed by the customer. In case of a ransomware attack that encrypts your files, they will remain inaccessible even if they are in the cloud. It is therefore necessary to integrate additional security services to truly protect data in the cloud, as well as train personnel on the correct configuration of access policies.

The false myth of the Firewall

Firewalls are a crucial element for defining the perimeter of the corporate network and controlling incoming and outgoing traffic. However, a traditional firewall alone is no longer enough to block today’s cyberthreats. This for two main reasons:

  • Many attacks occur using legitimate channels that are allowed by the firewall, such as email, websites and file sharing. The firewall controls only the communication channel, not the conveyed content.
  • Insider threats—attacks originating from compromised employees or devices already on the network—bypass the firewall completely.

To improve protection, it is necessary to adopt new generation firewalls with advanced functions such as IPS (Intrusion Prevention), sandboxing and advanced threat protection to also control the contents conveyed by the network. You also need internal network monitoring tools.

The false myth of the Antivirus

Antiviruses are essential for protecting endpoints such as PCs, laptops and servers from malware such as viruses, ransomware, spyware, trojans and worms. However, even traditional antivirus alone is no longer enough to stop today’s advanced threats. The reasons are two:

  • They rely on signature databases of known malware, and are therefore ineffective against new, unknown threats.
  • They can be fooled or disabled by advanced malware.

To improve the level of protection, enterprises should equip themselves with next-generation antiviruses that incorporate artificial intelligence and machine learning to detect even unknown threats based on their anomalous behavior, as well as signature databases. Furthermore, these advanced antiviruses adopt self-protection techniques to prevent deactivation.

Conclusion: The need for a modern integrated approach

As we have seen, solutions such as backup, cloud, firewalls and antivirus – while still important – are no longer sufficient by themselves to protect businesses and users against today’s advanced and constantly evolving cyberthreats.

Serve invece un approccio stratificato e moderno che integri: protezione avanzata degli endpoint, monitoraggio attivo 24/7 della rete per rilevare minacce interne ed esterne, formazione continua del personale, backup crittografati e immutabili, e server e postazioni separate per limitare l’impatto di eventuali attacchi.

In this context, services such as Secure Online Desktop SOCaaS, which combine professional 24/7 monitoring of the corporate network with threat analysis via a modern Security Operation Center, and advanced endpoint protection, can significantly improve the level of security for companies and organizations.

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • SEC Consult SA-20240513-0 :: Tolerating Self-Signed Certificates in SAP® Cloud Connector May 14, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 14SEC Consult Vulnerability Lab Security Advisory < 20240513-0 > ======================================================================= title: Tolerating Self-Signed Certificates product: SAP® Cloud Connector vulnerable version: 2.15.0 - 2.16.1 (Portable and Installer) fixed version: 2.16.2 (Portable and Installer) CVE number: CVE-2024-25642 impact: high homepage:...
  • TROJANSPY.WIN64.EMOTET.A / Arbitrary Code Execution May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/f917c77f60c3c1ac6dbbadbf366ddd30.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: TrojanSpy.Win64.EMOTET.A Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x64-bit "CRYPTBASE.dll" PE file in its current directory. Therefore, we can hijack the DLL and execute […]
  • BACKDOOR.WIN32.ASYNCRAT / Arbitrary Code Execution May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/2337b9a12ecf50b94fc95e6ac34b3ecc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.AsyncRat Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x32-bit "CRYPTSP.dll" PE file in its current directory. Therefore, we can hijack the DLL and execute […]
  • Re: Panel.SmokeLoader / Cross Site Request Forgery (CSRF) May 14, 2024
    Posted by malvuln on May 14Updated and fixed a payload typo and added additional info regarding the stored persistent XSS see attached. Thanks, Malvuln Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Request Forgery (CSRF) - Persistent XSS […]
  • Panel.SmokeLoader / Cross Site Request Forgery (CSRF) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Request Forgery (CSRF) Family: SmokeLoader Type: Web Panel MD5: 4b5fc3a2489985f314b81d35eac3560f (control.php) SHA256: 8d02238577081be74b9ebc1effcfbf3452ffdb51f130398b5ab875b9bfe17743 Vuln...
  • Panel.SmokeLoader C2 / Cross Site Scripting (XSS) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Scripting (XSS) Family: SmokeLoader Type: Web Panel MD5: 4b5fc3a2489985f314b81d35eac3560f (control.php) SHA256: 8d02238577081be74b9ebc1effcfbf3452ffdb51f130398b5ab875b9bfe17743 Vuln ID:...
  • Panel.Amadey.d.c C2 / Cross Site Scripting (XSS) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/50467c891bf7de34d2d65fa93ab8b558.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel Amadey.d.c Vulnerability: Cross Site Scripting (XSS) Family: Amadey Type: Web Panel MD5: 50467c891bf7de34d2d65fa93ab8b558 (Login.php) SHA256: 65623eead2bcba66817861246e842386d712c38c5c5558e50eb49cffa2a1035d Vuln ID:...
  • Re: RansomLord v3 / Anti-Ransomware Exploit Tool Released May 14, 2024
    Posted by malvuln on May 14Updated, fixed typo SHA256 : 810229C7E62D5EDDD3DA9FFA19D04A31D71F9C36D05B6A614FEF496E88656FF5
  • RansomLord v3 / Anti-Ransomware Exploit Tool Released May 14, 2024
    Posted by malvuln on May 14Proof-of-concept tool that automates the creation of PE files, used to exploit Ransomware pre-encryption. Updated v3: https://github.com/malvuln/RansomLord/releases/tag/v3 Lang: C SHA256: 83f56d14671b912a9a68da2cd37607cac3e5b31560a6e30380e3c6bd093560f5 Video PoC (old v2): https://www.youtube.com/watch?v=_Ho0bpeJWqI RansomLord generated PE files are saved to disk in the x32 or x64 directories where the program is run from. Goal is to exploit...
  • APPLE-SA-05-13-2024-8 tvOS 17.5 May 14, 2024
    Posted by Apple Product Security via Fulldisclosure on May 14APPLE-SA-05-13-2024-8 tvOS 17.5 tvOS 17.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT214102. Apple maintains a Security Releases page at https://support.apple.com/HT201222 which lists recent software updates with security advisories. AppleAVD Available for: Apple TV HD and Apple TV 4K (all […]

Customers

Newsletter

{subscription_form_1}