Intelligent Tech Channels Issue 23 | Page 28

ICA FR A AL I O N E L S G E R ANN CH A F RIC Hidden malware is the latest threat under debate, with organisations adopting efficient solutions. Experts at F5 Networks tell us more. HIDDEN MALWARE C ybersecurity continues to climb the priority list for organisations of all sizes and, with things changing as quickly as they do and new threats being introduced daily, it’s difficult to keep up. “It’s a sneaky one,” said Simon McCullough, F5 Networks’ Major Channel Account Manager. “Whereas threats like ransomware are really scary exhibitionists that strive to be acknowledged and feared, hidden malware would actually prefer to never be found. “That way, it can lie in the dark collecting personal and business data with absolutely nobody being the wiser.” With a large percentage of businesses now encrypting their web traffic using SSL/ TLS, many have increased their use of data encryption in an effort to stall hacks and threats. But these encryption measures come with their own brand-new set of issues. “Overall, this is a positive trend,” added Anton Jacobsz, Managing Director at Networks Unlimited. “However, as they do, hackers have quickly evolved their approaches and found a way to introduce hidden and malicious codes with SSL/TLS encryption basically serving as a tunnel, allowing it smooth and hidden passage as 28 EXPOSED it breezes through firewalls and into the business network – undetected.” This reality is forcing businesses to build or adopt efficient solutions that allow their network and apps to respond to the increased demands of ubiquitous encryption. There are a few routes these businesses can take, said McCullough, but only one of them is worthwhile. Visibility into encrypted traffic is key to protecting applications and securing data.