This post is part of our Cyber Threat Series.
Advanced Persistent Threats, APTs, differ from other attacks in their sophistication and goals. Often coordinated by groups of cyber criminals, APTs often use multiple attack vectors. They are frequently motivated by political, economic, or espionage intent. APT attackers are patient. Whether the attackers claim a moral high ground or are simply out for economic gain, the impact can be devastating.
APTs often start with an infection that sits idly on your systems “listening” and learning. In doing so, they learn how to self-propagate and do more damage before they activate. The average APT may sit, listen, and learn for as long as six months before activating.
What to Do:
You need a bit more than the Next Gen firewalls, endpoint protection, advanced threat protection, dns/web protection, user education, and other solutions covered in prior Cyber Threat Series blog posts. Preventing APTs requires that these services are deployed and managed in a coordinated manner that matches the level of protection your business needs and wants.
Unlike other forms of attack, APTs often use secondary devices and networks — Internet connected HVAC systems, cameras, and other devices — as a way around standard network security. Network and traffic segmentation, while requiring additional administration, can prevent APTs from crossing over into your computing environment.
Contact us to discuss your cyber threat protections. The Cloud Advisory session is complimentary and without obligation.