5 Ways to Improve Your Cyber Security Posture
John Iacono • April 20, 2017

April 20, 2017

Data security is a top priority for every organization from retail and finance to healthcare and government and everyone in-between. Blocking malicious access and activity is not an easy endeavor as we have seen from the high profile breaches in recent years. Once inside, hackers essentially have had unfettered access to launch an attack as the time to detection has been notoriously slow.binary-2007356__340.jpg

With the threats we are facing and the sophisticated hacker’s ability to break through defenses, detection becomes a critical component of all security infrastructures.  What do we need to be looking out for?

Ransomware

While not new, ransomware is on the rise and was proven to be one of the biggest challenges of 2016 – and will only increase in 2017. Email and malvertising containing malicious malware have been the primary launch vectors for ransomware although there appears to be an increase in network and server-side vulnerabilities that are involved in the exploits. The motivation behind these attacks is not to steal data but to encrypt your data until a ransom has been paid. This attack has been not only profitable for the attackers but is so successful that they increasingly refuse to unlock the data and demand more ransom. When data has been unencrypted it is hard to recover 100% and there is no guarantee of the data integrity. There is also a high incidence of reinfection.

Existing Vulnerabilities

Vendors have paid closer attention to fixing vulnerabilities quickly but there can be a lag time between the issuance of a fix and the time it is patched on a system. Unpatched vulnerabilities and outdated systems are a major attack vector for hackers to use social engineering, malware exploit kits, ransomware, and more, to achieve their goals.

Exploit kits attackers are widely available to anyone with intent who can then easily compromise systems through pdf files and Flash content and launch attacks.  According to Cisco, using the Nuclear exploit kit, Flash accounted for 80 percent of successful exploit attempts. In addition, server-based campaigns are also on the rise because of their profitability, similar to ransomware.

Weakest Links

It has been said and continues to be true that your employees are your weakest link. The insider threat can include sabotage, theft, espionage, and fraud. Very often insiders unintentionally assist a threat actor by falling for phishing campaigns or clicking on a malicious link to allow malware to propagate throughout your network. While we tend to hear more about the big breach from the outside the insider threat is still very prevalent. Training employees to recognize scams and not clicking on links or opening email from unknown senders can go a long way to keeping your network safe.

Unusual behavior patterns

Time to detection is critical. According to Microsoft, the average time attackers stay in a network before detection is over 140 days. During that time they can escalate privileges to gain access to sensitive data or wreak havoc on your systems. Analyzing behavior is the best way to detect potential threats. Unusual behavior patterns from employees or systems sends a red flag that you may have a potential threat. Isolating the activity until it can be analyzed is critical to stopping bad actors from causing harm.

It’s important to understand where your data resides , your system configurations and your vulnerabilities in order to develop a cybersecurity plan that will keep your most sensitive data safe.

Request a FREE network assessment

Our engineers will come onsite and give you the facts about your infrastructure.  After our walk through and evaluation, we will discuss any pain points you may be experiencing along with providing short, mid, and long term recommendations.

The objective of the assessment is to:

  • Improve efficiencies
  • Increase productivity
  • Streamline processes
  • Reduce IT expenditures

Related Articles: 

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →