A Data Breach Threat Analysis addresses concerns related to Advanced Threats and Advanced Evasion Techniques.
Today’s cyber attacks are more stealthy and malicious than ever before and are programmed to remain unnoticed for as long as possible until an opportune time in the future to inflict damage. Although signs of the intrusion likely exist, many of today’s sophisticated data breaches are undiscovered for months.
Sixty-one percent of companies that experienced a data breach were notified by a third party that it had occurred, according to a recent U.S. Secret Service data breach report. In addition, 86 percent of data breach victims had evidence of the breach on their network before it was detected by them or a third party.
Malware and Unpatched Systems
Many computer security breaches occur today because of the time lag between discovery of a vulnerability and installation of security patches. Simply stated: traditional anti-virus/anti-malware vendors continue to lag behind online criminals when it comes to detecting and protecting against new and quickly evolving Internet threats. Add this time lag to the patching schedules of diligent IT administrators, you have approximately a three month vulnerability window through which malware can be injected into the network. However, the vulnerability window is extended many more months and sometimes years when systems remain unpatched. The data extracted from conducting hundreds of network vulnerability assessments on networks shows that the number one vulnerability found is unpatched systems.
Video: Data Breach Threat Analysis
Data Breach Threat Analysis Approach
To respond to this growing threat Sword & Shield adds Data Breach Threat Analysis (DBTA) to our traditional Network Vulnerability Assessment and Penetration Testing (NVA/PT) to assess the 86 percent of data breach victims who do not know they have been breached. DBTA proactively identifies:
- The types of attacks that companies are experiencing,
- The origin of the attacks, and determines if there is evidence of an existing threat in the form of malware and viruses.
|Initiate a Case|
|Don’t Attempt Your Own Investigation|
|Federal Rules of Civil Procedure|
By leveraging our extensive Incident Response experience and methodology the Data Breach Threat Analysis methodology takes a “snapshot in time” to:
- Profile real time attacks being perpetrated against the network,
- Determine the origin (IP address and country of origin) of the attacks,
- Determine the likely intent of the attacker,
- Detect malware and viruses that may have already been introduced and remains undetected, and
- Determine whether a system breach has occurred through a known vulnerability or an unknown vulnerability (0-day). The data sources captured in the snapshot will contain forensic evidence of the existence of the vulnerability and or attack.
Find Out More
Sword & Shield has been outsmarting cyber-criminals and improving security for enterprises around the world since 1997. Fill out our Consultation Request form or call us so we can begin securing your future.
U.S. Toll-free: 800-810-1885