Computer and Tablet

As we head into 2017, cybercriminals still have the advantage. This is despite the billions of dollars worldwide we sink into cybersecurity.

This is concerning—especially since most of the attacks we face are predictable. For example, there’s a lot of hype around hacking events (like blaming whole countries on them), but the truth is that most data breaches fall into common areas of attack.

(Get your instant download of the 2017 IT security checklist here, or keep reading for another chance to download later.)

According to a Verizon report, “Data Breach Digest: Scenarios from the Field,” there are typically a handful of common scenarios that make up the usual incidents the Verizon RISK Team discovered in the field.

The scenarios could be grouped into four common categories:

  1. The human element: these scenarios included human threats or targets
  2. Conduit devices: these scenarios included device misuse or tampering
  3. Configuration exploitation: these scenarios included reconfigured or misconfigured settings
  4. Malicious software: these scenarios included sophisticated or special-purpose illicit software

The Human Factor

In another Verizon report: “Verizon 2016 Data Breach Investigations,” more data supported the idea that humans are often a key component of an attack.

Credentials being compromised is a key factor today. Did you know that your Microsoft Active Directory (AD) could be under assault right now?

Active Directory is a central hub that controls access to users, IT systems, devices, applications and more. The entry point to it can often be compromised credentials, accessed in a variety of ways, including human error. And the data that cybercriminals access when they get into AD is what we call “the keys to the kingdom.”

However, because AD isn’t a priority for most security teams, it’s an often-overlooked entry point. Many organizations don’t even know there’s a risk.

What Next?

So the verdict is in: We’re still vulnerable to the attacks that we’re aware of, and we’re also vulnerable to attacks that we probably haven’t thought of.

What to do? First, let’s assume that we’re coming from a place where we’ve already been breached. That means, we know cybercriminals have a way in. Now, it’s a question of containing what they can do once they get there.

There are several steps we can take in 2017 to help create a more secure environment. For insights, get your copy of the Skyport Systems “2017 IT Security Checklist,” a high-level overview of how hackers operate, and what to do to disrupt their progress in 2017.

Plus, download a bonus resource that takes a deeper dive into the topic of cybersecurity, and how to spend less but get better results.

Going to RSA? Visit Skyport Systems at the RSA Conference February 13 to 17 in San Francisco, Calif. at the Moscone Center, North Expo booth #3941. Confirm a time to meet with us at RSA, and see how we can partner to secure your most critical applications.