Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Access rights to networks on open market

Arbor Networks : 19 November, 2012  (Technical Article)
Arbor Networks sees the open trade of access credentials to computer markets as the democratisation of cybercrime
Access rights to networks on open market

In relation to the news that cybercriminals are now openly selling illegal access to the computer networks of many of the world's biggest companies, Jeremy Nicholls, Channel & Business Development Director EMEA at Arbor Networks has the following comments:

“We are seeing democratisation in the world of cybercrime, where more people have access to cheap tools, fast. Attacks are on the increase, and despite huge technological developments to protect against threats, hackers still seem to be one step ahead of the game. As a result of this, there is a greater need for organisations and countries to identify their most critical assets and ensure they are comprehensively protected.

“Visibility of the network is crucial. Organisations need to understand which digital assets are important to protect, where they reside, who has access to them and how to lock them down in the event of a breach. Countries and organisations shouldn't question whether they will be attacked, they should assume they will be attacked, and should therefore ensure they deploy the correct security solutions in place.

“Now more than ever we need three things: visibility of what is going on within' our security perimeter, so that we can detect threats inside our networks which may have evaded or bypassed our perimeter defences; intelligence on the behaviours and indicators we should look for to identify compromised devices; forensics on what users and systems have been doing (potentially over an extended period), so that we can identify the extent of any compromise. If we add these additional capabilities to our existing layered security models, then we canminimise the risk to our businesses."

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo