Intelligent Tech Channels Issue 04 | Page 42

INTELLIGENT ENTERPRISE SECURITY

Internal firewalls new mantra to curb insider attacks

With rise of attacks from within weak segments of the network , the line between trusted and untrusted traffic has blurred , says Michael Xie from Fortinet .

Traditionally cyberattacks on corporate networks have come from outside the organisation . With the growing usage of personal mobile devices and the rise of the Internet of Things , the danger now comes from within .

The world moves swiftly , the IT security world even more so .
Just a couple of years ago , securing the enterprise would basically consist of protecting an organisation from external intruders . Today , the battle has changed ground . Education efforts from industry players have created higher levels of IT security awareness in the business world , and more firms have implemented basic security measures that can thwart direct attacks effectively .
This development is forcing hackers to go up the game by figuring out alternative ways to get their hands on valuable enterprise assets . One new strategy that is becoming more common across the world is for hackers to gain entry to a corporate network by targeting its weakest points .
Such points can include an unsecured employee mobile phone , or a workstation with limited access to corporate data . These weak points typically reside in low value segments of the corporate network . Once the hacker breaks in and gets a toehold , however , they can navigate to other more valuable parts of the network , which tend to be more rigorously protected from external attackers , quite easily .
This lateral movement modus operandi proves to be effective most of the time because many organisations do not isolate different segments of the network from one another . Moving from segment to segment is usually a breeze once hackers get into the network .
A few trends will make such attacks from within the organisation more common in the coming years :

1

Adoption of employee-owned mobile devices in enterprises These are often poorly secured and provide a weak point of entry into the organisation for hackers .

2

Exponential growth of
IoT devices Early and even current versions of these devices are not designed with security in mind , and are tedious if not impossible to secure properly .
42 Issue 04 INTELLIGENT TECH CHANNELS