What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign?

In recent years, some in the cyber world recognize that there is a lot to learn from the biological world when protecting systems against viruses. Now, the Corona epidemic presents an opportunity for the medical world to learn something from the cyber world. To analyse the strategies selected by various countries, let’s review it through the lens of cyber strategies.

No silver bullet 

Let’s begin by recognising that cybersecurity is built in layers. There is no one magic solution or layer which will prevent all the possible attacks. Furthermore, in the cyber world, it has been realised for some time that it is impossible to protect everything for all eternity. There will be victims. Computers will be attacked, information will be stolen, and activity will be interrupted, etc. It has already been accepted in the business world that it is not possible to maintain an extremely high level of protection, while at the same time enabling a business to run at its required pace.

A compromise must always be found, and risks managed. Extremely high levels of security are possible, but this will give rise to a situation where work may grind to a halt. Businesses accept that by running freely, they expose themselves to various levels of cyber threats. The challenge, which has become the main responsibility of information security managers, along with their organisations, is to learn how to live with this day-to-day compromises. To understand the risks they take, determine what level of risk they can accept, and what level of risk is too great.

Dealing with a threat surgically 

Just as businesses weigh various protection approaches, we can see several strategies for protection against Coronavirus being implemented by various countries. In Asia, South Korea, and Taiwan, a relatively advanced approach have been adopted of detecting the threat, finding where it is harboured, and dealing with it surgically wherever identified. All this is in conjunction with a basic layer of disinfecting large areas. As in the cyber world, this can be seen in the use of advanced concepts of threat hunting and extensive investment in detection and incident responses.

All this is above and beyond the basic layer of a standard firewall and endpoint protection in order to provide some basic level of protection throughout the whole organization. This approach is a reflection of an understanding that the “point of contact” to the world will be breached, or in the professional slang, “the perimeter is dead.” It is not possible to achieve full protection and keep the threat outside the perimeter forever. The threat must be sought out on a targeted basis and dealt with wherever identified without giving up on a basic layer of protection, which will succeed anyway in preventing the simpler threats from penetrating.

In with the old 

Aside from these countries, most countries in the world, including Israel, Italy, and The USA have adopted approaches that are considered traditional and older, according to the cyber world. Israel began with an approach that derives from the belief that there is indeed a “perimeter” and that the threat can be blocked externally and prevented from getting inside. As mentioned, in the cyber world, this approach is now widely thought to be inherently irrelevant. Subsequently, Israel, like Italy and the USA, transitioned to taking the approach of a callous and aggressive policy.

In the cyber world, such an approach equates to a policy of a strong lockdown of the network, preventing the transmission of information between points in the network. This makes any approach to the resources of the network difficult and, in general, terms attempt to reduce traffic on the network.

Such an approach can indeed succeed in producing achievements in terms of preventing breaches of the network and the endpoints, but it also has the effect of preventing most of the activity on the network and, consequently, having an adverse effect on the organization’s business activity. Such an approach to protection was previously beneficial at sensitive locations such as Defense Establishment Institutions, but over the years, they have also understood that it is impossible to operate over time with such difficulties piling up over the activity of the organisation.

In the IDF, it was realized several years ago that in order to achieve the aims of the organisation, it must allow more access to the network, to facilitate more connections and transmission of information between endpoints. In order to reduce potential risk, the organisation has sought more advanced protection approaches.

The stickability factor 

Throughout the industry, it is now difficult to find organizations that still stick with the approach of a robust and aggressive cyber policy. In the last decade, we have witnessed a shift towards more sensible and considered risk management, which attempts to strike a balance between the need to facilitate activity and the desire for protection.

Britain has attempted to adopt its own unique approach, which, by contrast, the cyber world finds slightly illogical. In fact, Britain has attempted to rely upon the immunity of all its citizens, and in cyber terms, it is as if they are content with the installation of anti-virus software at all the endpoints. This protection approach has not been relevant in the cyber world for approximately 20 years, and there are currently no organisations in existence that use it as their approach for protection, with the possible exception of very small businesses.

It is possible to analyze the operational approaches of the countries from another angle in the cyber world, and that is “threat intelligence.” On one side of the spectrum is the USA, which appears to have approached this situation with a profound lack of information, to the point of ignorance in the face of the threat. On the other hand, Israel has learned as much as it could about the threat and has attempted to prepare for it ahead of time.

Today in the cyber world, there is a growing acknowledgment of how difficult it is to build a layer of protection against cyber threats without engaging in the acquisition of advanced information related to threats and their nature. Currently, the leading organizations worldwide, with their own ability to protect themselves, are widely reliant upon information when addressing cyber threats.

Paying attention to public reactions

Another analogy to the cyber world can be analyzed from the public reactions in various countries. Apparently, in Singapore, Taiwan, South Korea, and perhaps other places, the public has strictly complied with governmental directives, understanding the risk and responding well to the threat. On the other end of the spectrum is Italy, which reacted complacently, did not heed governmental instructions, and didn’t understand the size of the threat. Thus, in cyber, the sphere of awareness and training which has been gathering momentum in recent years tries to get the personnel of the organisation to appreciate the threat and educate them on proper procedures in the presence of a threat. This is regarded as maintaining “cyber hygiene,” which reminds employees not to open suspicious emails, how to report something suspicious to the organization, etc.

Organisations that have invested in educating people regarding awareness and correct actions have reported an improvement in the immunity of the organisation to cyber threats. In organisations that have not invested in this at all, most people find themselves falling prey to cyber-attacks such as email impersonations.

The innovative prevent

It appears that in the cyber world, more advanced organisations are adopting more innovative approaches, and the use of advanced tools such as threat hunting, detection, incident response, as well as employee awareness have produced better results in coping with cyber threats. Thus, in the physical world, countries that have adopted similar approaches appear to have succeeded, at least for now, in containing the virus’s threat in terms of a dramatic reduction in the number of cases of infection and are on the point of at least a partial return to routine.

Countries viewed as maintaining more traditional approaches and that are attempting to sanctify the perimeter or apply tough, aggressive policies as their major effort, are finding it very difficult to contain the threat. These countries are still seeing a rise in cases, coupled with a widespread paralysis of economic activity, and the economy as a whole. If countries wish to learn lessons from the world of cyber protection in order to deal with the Coronavirus threat, then they must bear in mind that building defenses must consist of several layers. No one method can avoid the threat.

Investment efforts must be put toward prevention. It is essential to create a basic level of control and monitoring of entrances, but the action is also necessary on the level of detection and treatment. This can only be done properly by adequately gathering and analyzing the latest data. It is to be hoped that more and more countries will consider adopting more advanced protection approaches, finding ways of applying them in the physical world in order to accelerate the end of the threat and bring about a return to a normal routine.

Zohar Rozenberg,VP Cyber Investments, Elron.

Zohar serves on the board of directors for several technology companies. In his previous role as an IDF 8200 unit Colonel (Rtd), Zohar assisted in the founding of Israel’s National Cyber Bureau, formalizing the country’s national cyber strategy. His final role with the IDF was as the head of its cyber department. He is always looking for bold and innovative entrepreneurs which their ideas promise to shape our tomorrow.

 

[ad_2]

Article Source link

Is your business effected by a COVID-19 / Coronavirus related Cyber Crime? 

If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice fraud, email scams, banking scam, CEO fraud. Cyber fraud can lead to major disruption and financial disasters. Contact Digitpol’s hotlines or respond to us online. 

Digitpol is available 24/7.

Email: info@digitpol.com
Europe +31558448040
UK +44 20 8089 9944
ASIA +85239733884