Intrusion Detection Systems

How would you know if a hacker is on your home or business network?

Most organizations find out way too late they have been compromised. Most of the times a hacked company is informed of their breached by a 3rd party company. Some of them may never be notify and only find out after someone in their family or business has their identity stolen. The prevailing thought is a hacker will get in. So how will you know or find out when they get in?

Here’s Some major breaches that happened to private businesses and governments

  • When Target was breached in 2013 they said attackers lurked on their networks for months without them knowing.
  • When infoSec RSA was breached in 2011 it was reported hacker lurked on their network for some amount of time, but it was too late when they found out.
  • When the Office of Personal Management (OPM) was breached holding personal records of 22 million people exposed their sensitive information they weren’t able to find out until it’s too late.
  • The Bangladesh breached and lost 80 million and they only reason why the hackers did get more money was because they made a typo that was caught.

There are many more breaches where the hackers were not detected

How long would it take you or your company to find out if a hacker had breach your network looking to steal your business or personal information? According to FireEye in 2015, the median time from compromise to discovery was cut by 59 days, down from 205 days. This is still a very long time for a hacker to get in and steal your data.
Time From Compromise Discovery

The same report from FireEye highlighted new trends for 2015 where hackers are causing major disruptions. They are disrupting business, stealing personally identifiable information and attacking routers and switches. I believe this new trend will continue into the foreseeable future.

Three New Trends In Cyber Crime In 2016

There’s far too many people and companies who are depending on prevention and not detection. Let’s be honest, we cannot guarantee that a hacker cannot or will not hack your system. What will happen if they do hack into your system? How will you know there are on your system? This is where Cyber Security Consulting Ops can help your home or business network to implement a good detection strategies can help to detect un-wanted visitors on your system. We MUST shift our focus to both prevention and detection. Intrusion Detection can be defined as “…the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource.” More specifically, the goal of intrusion detection is to identify entities attempting to subvert in-place security controls. Asset Must be use as bait to entice and track bad entities for early warning.

2 Comments

  1. I must say you have hi quality articles here. Your blog
    can go viral. You need initial boost only. How to get it? Search for; Miftolo’s
    tools go viral

Leave a Comment

Your email address will not be published. Required fields are marked *

*