With all the focus on cyber security at the conference, we had a lot of interesting conversations at our booth. Most of the MSPs were hearing the cyber focus loud and clear.
The problem is, cyber defense technologies that traditionally protected us from attack are often no longer able to do so. Firewalls, anti-malware tools and the like cannot block zero day attacks that haven’t previously been identified. Zero days can slip past conventional perimeter security tools undetected, and then wreak havoc inside the network.
I’m always shocked when 20 year old exploits become news, but last week’s furor around the Equation cyber espionage group detailed in the Kaspersky report warranted a response. The infiltration technology mentioned in this report – introducing rogue firmware into the IT infrastructure supply chain – has been around for a very long time.
For our purposes, we want to look at the article’s number one identified 2013 information security challenge – state-sponsored espionage – as well as two other common, though growing, security concerns: password management and insider threats.