Key Findings of 2018 Cyber Threat Report and How Government Can Respond

Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essential information to help secure their systems effectively.

By the nature of the topic, the report isn’t an easy read. Expect to be perturbed. However, the insights provided into today’s rapidly evolving threat landscape are invaluable.

Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack

Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.

The Threats

Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack

Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.

The Threats

SaaS Offering Simplifies Remote Application Access Control, Reduces Attack Surface

Ransomware tops today’s list of security concerns for governments, and no agency is immune. Just look at the statistics:

• Cook County, Chicago was a victim of last year’s WannaCry ransomware attack.
• St. Louis Public Library was hit with ransomware, demanding $35,000 in Bitcoin.
• Bingham County, Idaho paid out #3,000 in ransomware to restore its servers.

Three Ways to Reconcile the Dueling Forces of IT Modernization and Security

When it comes to network modernization and security, federal IT may be experiencing a case of dueling personalities. On one side, network modernization is essential to a better security posture. This is because outdated legacy IT systems are more prone to vulnerabilities and were never designed to handle today’s threat landscape. However, the very act of modernizing networks may actually be making those networks less secure, at least in the short term.