
No IT chief needs to inform the C-suite a few critical breach that took benefit of a identified infrastructure vulnerability.
Hackers develop new assault methods so usually that it’s simple to neglect a basic fact about cybersecurity: hackers don’t should depend on discovering new vulnerabilities. The shortcoming of organizations to promptly handle the quickly rising variety of identified vulnerabilities means they’ll efficiently breach their goal’s defenses utilizing well-understood exploits.
For instance, uncovered in December 2021, Log4J is a flaw in a ubiquitous open-source framework that would allow attackers to take full management of a server — and although it’s greater than a 12 months outdated, now, hackers are nonetheless making an attempt to use it. A research from Tenable discovered that as of October 2022, 72% of organizations remained susceptible to Log4J [1], and in November, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) reported that an Iranian-sponsored group compromised a federal community in an assault that leveraged Log4J [2].
It’s disturbing that such a harmful, extremely publicized vulnerability would stay unpatched in most environments for almost a 12 months after its discovery. And the Log4J instance is simply the tip of the iceberg. CIASA started compiling its Known Exploited Vulnerabilities (KEV) catalog in November 2021. As of February 2023, the variety of vulnerabilities was approaching 900.
Dangerous actors are chomping on the bit to use these vulnerabilities to steal information, launch ransomware assaults, and wreak havoc. For instance, the Conti Group is a Russian group that launches devastating ransomware assaults primarily based on a franchise mannequin. The injury they’ve prompted is so devasting that one nation, Costa Rica, declared a nationwide emergency final 12 months [3]. And Conti leverages dozens of identified vulnerabilities listed within the CISA KEV catalog to do their malicious work.
With so many vulnerabilities recognized within the final two years, no group can sustain utilizing handbook methods, particularly given the huge complexity of contemporary IT infrastructures. Lacking a single patch on a single server might create an assault opening.
Prevention practices ought to embrace the deployment of an automatic platform to determine, report on, and patch susceptible methods. Respected third-party providers can additional improve your defenses by constantly looking for and patching the newest vulnerabilities.
IT groups additionally want to grasp the state of their infrastructure to allow steady compliance. Most organizations have no idea which of their endpoints, for instance, are on the newest patch for his or her commonplace working system, a lot much less different software program purposes.
HCL’s reply to cybercrime
BigFix CyberFOCUS Analytics is a brand new functionality designed to assist IT Operations crew uncover, prioritize, and patch crucial vulnerabilities and scale back cybersecurity threat in actual time. In contrast to siloed processes primarily based on disparate groups and instruments, BigFix delivers a single, built-in answer that eliminates the inefficiencies in passing information from a number of instruments to the completely different groups who’re liable for enterprise safety.
BigFix CyberFOCUS Analytics are included with BigFix Lifecycle, BigFix Compliance, and BigFix Remediate. By leveraging endpoint info that solely BigFix is aware of, BigFix CyberFOCUS Analytics gives the power to simulate vulnerability remediations, to outline and handle Safety Degree Agreements (PLAs) and analyze CISA Identified Exploited Vulnerability exposures.
With correct planning and preparation, IT leaders can sleep a bit simpler figuring out that their atmosphere can repel assaults that exploit identified vulnerabilities. And with their defenses in place, they’ll react rapidly ought to an assault get via.
Be prepared earlier than an assault happens. Study extra at https://www.hcltechsw.com/bigfix/products/cyberfocus