Intelligent CIO North America Issue 17 - Page 74

THERE IS A VERY REAL RISK THAT IN THE NEAR FUTURE , ORGANIZATIONS WILL BE FACED WITH A SITUATION WHERE EVERY PIECE OF MALWARE IS NOVEL OR UNIQUE .
INDUSTRY WATCH huge number of threats , they are reactive in nature . This presents a particular problem when trying to secure networks against malicious content hidden within files and documents shared in their billions worldwide on a daily basis .
Even after attachments had undergone malware scanning , hundreds of files were later found to contain malware , because they had not yet been recognized by the tools as ‘ known bad ’ and could therefore penetrate the organization .
Specifically , securing systems against the risk posed by file-based attachments forms part of a comprehensive approach to issues such as ransomware and zero day threats . One large enterprise , for example , processed 115 million attachments over a period of just three months – a huge opportunity for bad actors looking to distribute malware .

THERE IS A VERY REAL RISK THAT IN THE NEAR FUTURE , ORGANIZATIONS WILL BE FACED WITH A SITUATION WHERE EVERY PIECE OF MALWARE IS NOVEL OR UNIQUE .

Among the challenges this presents is that approximately one in every 100,000 files contains potentially malicious content , with 98 % of them being unknown by antivirus and sandboxing solutions for anything up to 18 days before they can mitigate the risks . That ’ s a potentially devastating blind spot for networks that are already under immense pressure from cybercriminals who are employing more sophisticated tactics in order to succeed .
Taking a proactive approach means that IT infrastructure is protected from these ubiquitous threats before they reach users via attachments . For instance , comparing the ‘ DNA ’ and content of each file and document to its ‘ known good ’ industry specification enables organizations to proactively eliminate cybersecurity risks . It ’ s vital , however , that this is achieved without negatively impacting employee productivity or disrupting effective user experiences .
As a result , users can be protected from the type of attacks that have proved so effective for cybercriminals looking to distribute malware and exploit a wide range of vulnerabilities that exist across today ’ s networks , services and applications . With the outlook for the next 12 months likely to present both familiar and completely new risks , organizations that fail to review and – where necessary – modernize their cybersecurity strategies are likely to see their levels of vulnerability increase .
In a world of unknowns , this is crucial for organizations that want to focus on building a comprehensive security stack that keeps ahead of the evolution of cybersecurity risks . It also forms part of a rounded security strategy in which forward planning is combined with effective technologies to significantly reduce the risk both before and after a security breach .
The UK / US cybersecurity partnership is a testament to the strength of the transatlantic security and intelligence alliance . As world-leading cyber powers , a combined effort between both countries will see each benefit from this partnership and will better protect our connected nations and beyond . This will offer a crucial foundation for organizations across both public and private sectors to meet the cybersecurity challenges they will inevitably face in 2022 . p
74 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com