Related Posts
小型企业选择门禁控制系统的 7 大标准
中小企业访问系统评估详解, 从成本和安全性,到支持和扩展性。
In December 2020, a significant number of organizations and US Government agencies were victims of a sophisticated cybersecurity attack started primarily by a trojan backdoor hidden in a routine update of SolarWinds Orion software. While experts are still uncovering details, they have concluded that the attackers successfully perpetrated a complex attack with multiple attack vectors.
The attack included compromising SolarWinds infrastructure with malware that monitored the build server of SolarWinds Orion software for commands authorizing a software build. Once this malware detected the build commands, it inserted code for the backdoor into a legitimate update of the Orion software. Subsequent to distribution of the trojanized software to many of the 18,000 SolarWinds customers, the attackers targeted specific customers by using the backdoor to infiltrate an infected computer and use this access to laterally move across the network to different systems.
While there certainly will be learnings that will be applied to future cybersecurity best practices, it is clear that organizations must, at a minimum, follow the fundamentals of cybersecurity in order to mitigate the risks of these types of attacks. Without implementation of these security practices, hackers will have an easier time achieving a successful attack and turn your organization into a tempting target. Even in medium-sized organizations, technology infrastructure tends to be as complex as larger organizations. The staff responsible for information security need to collaborate with systems and network engineers to conduct a thorough analysis of possible vectors and component vulnerabilities. From this analysis, organizations can formulate a plan that increases the overall security posture and establishes the best footing to mitigate future attacks.
Regardless of the size of an organization, any cybersecurity mitigation plan must include implementing basic techniques such those listed below:
The practices listed here are just a subset of those needed for a comprehensive cybersecurity plan. Check out our portfolio of identity and access management solutions to find an option to match your organization's cybersecurity needs.
Mrugesh Chandarana is Product Management Director for Identity and Access Management Solutions at HID Global, where he focuses on IoT and PKI solutions. He has more than ten years of cybersecurity industry experience in areas such as risk management, threat and vulnerability management, application security and PKI. He has held product management positions at RiskSense, WhiteHat Security (acquired by NTT Security), and RiskVision (acquired by Resolver, Inc.).