Categories: Newsletter

Network Monitoring News – Sep 2016

Drones

We have been hearing a lot about drones as of late. A new trend is for hackers to use drones to hover close to buildings or perch on a roof or ledge to feed open connections for Bluetooth and WiFi to internal users. They are also using drones to hack solar panels and other devices/equipment that were previously inaccessible.

Much more concerning is the use of drones to hack into cars. Drone jammers are devices that can jam the signal between the drone and handset, forcing them to land, my guess is we will be seeing companies mass produce these devices to prevent drones from accessing areas where they are not wanted.

Apple Patches

Apple issued emergency OS patches for the Mac, fixing the same three vulnerabilities the company addressed last week on the iPhone.

The trio of bugs were used to spy on an activist in the United Arab Emirates by turning his iPhone into a surveillance tool.

Getting Secure

Intrusion Detection is now a must have. Years ago IDS consisted of a single software package that parsed data against a rule set. Now, Intrusion Detection is pulling data from multiple sources (Log files from servers, logs from firewalls and other network equipment etc.) and parsing, categorizing, summarizing all data.

  1. Monitor Applications with Access to Data
  2. Create Specific Access Controls
  3. Collect Detailed Logs
  4. Maintain Security Patches
  5. Be Aware of Social Engineering
  6. Educate and Train Your Users
  7. Outline Clear Use Policies for New Employees and Vendors
  8. Monitor User Activity
  9. Create a Data Breach Response Plan
  10. Maintain Compliance

Not only does modern IDS look for problems, it is also looking for unexplained traffic or anomalous activity. IDS also looks for internal users connecting to command control servers, malicious web links, phishing, ransomware and much more. Most important, they enable us to find when our prevention systems have failed. Once an event is found, modern IDS can also retrieve all the records and logs to help track down the 5 W’s (Who? What? When? Where? Why? How?) about the incident.

Ron Samson

Share
Published by
Ron Samson

Recent Posts

Cloud-Based EDR: Simplifying Security Management for IT Teams

In today's era of increasingly sophisticated cyberattacks, IT departments are always looking for effective ways…

3 weeks ago

EDR for Small Business: Key Features You Should Look For

In today's digital world, small businesses are an increasingly likely target for cybercriminals. With cyberthreats…

4 weeks ago

Advanced EDR: Key Benefits for Enterprises in 2025

In the rapidly evolving world of cybersecurity, businesses are increasingly seeking solutions that can protect…

4 weeks ago

How SOC as a Service Pricing Works: A Complete Breakdown

As businesses face an increasing number of cyber attacks, some are turning to Security Operations…

1 month ago

Managed SOC for MSP: Boosting Service Offerings and Revenue

In this age of digitization, security is not only necessary; it's a differentiator. For Managed…

1 month ago

24/7 Managed SOC vs In-House Security Teams: What’s the Best Choice?

In the contemporary digital era, cybersecurity is of high priority for small and large enterprises.…

1 month ago