Optimal Strategies for Constructing Layers of In-Depth Defense

Morgan Phisher October 20, 2023

Hey there, fellow Bay Area dwellers! Let’s chat about something that’s keeping our cybersecurity and healthcare friends up at night – the landscape of threats we’re facing today. It’s a wild place, with the need for multiple layers of defense more important than ever. Let’s break that down a bit.

Consider the rise of remote work – it has completely redefined the boundaries of our networks. We can’t draw a neat circle around our data anymore, and even robust two-factor authentication isn’t foolproof – remember that unfortunate incident with Twilio?

And these challenges are just the tip of the iceberg. Not only are threats evolving, they’re getting sneakier. A study recently carried out by some clever folks in France found that 40% of threats can slide by even the best next-gen antivirus tools. Add to this the fact that about a quarter of all cyber attacks involve some form of lateral movement, where hackers jump from one part of the network to another, and it’s clear we need more than a single layer of defense.

Stay with me here folks – we’re not just talking about slapping on more security products like Band-Aids on a wound. A solid defense is a combo of bolstering our people, improving our processes, and equipping our tech to create a fortress around our precious data.

Let’s begin with our people. We’re all human, right? And humans make mistakes. A staggering 82% of all security breaches last year happened because someone slipped up. Training is crucial, but relying solely on employee diligence in following policy isn’t enough. We need dependable controls like multi-factor authentication (MFA) as a strong safety net.

Next, let’s check our architecture. Picture your network like your home – if you have one big open plan space, once an intruder gets in, there are no doors to stop them rifling through your entire house. The same goes for our networks. To build those much-needed doors, we should lean into network segmentation and subnetting. This way, if a threat emerges, we can isolate it without taking down the whole operation.

Okay, moving along – let’s talk about our tech. It’s not one-size-fits-all. Over 70% of our peers prefer tailored, or “best-of-breed,” solutions rather than platform-based controls. These don’t just prevent advanced attacks but also reduce administrative strains. Now, don’t forget the simple stuff – running an effective antivirus program, using endpoint protection, and maintaining internet-facing assets behind firewalls.

Keep in mind – it’s not just about deploying the right tools but also keeping them up to date. According to a recent report, over 40% of incidents occurred due to unpatched vulnerabilities or misconfigurations. Do you recall the havoc wreaked by the ProxyLogon vulnerabilities last year?

And, we’re approaching the finish line here folks, hang in there! One more cool concept to consider is something called “Automated Moving Target Defence” (AMTD). See, even with the best AI and automation, it still takes an average of 249 days to identify and contain data breaches. AMTD shields us against attacks that evade traditional protection mechanisms by essentially making our data a moving target – hard to hit what you can’t see, right?

These are the layers we need to build a bulletproof defense strategy in today’s complex threat landscape. Sure, it’s not easy, but if anyone can do it, it’s us, the brave and innovation-driven dwellers of the Bay Area. So let’s roll up our sleeves and get to it!

by Morgan Phisher