In 2016, SonicWall detected a 600% growth in ransomware families. We saw a wide range of ransomware forms and attack vectors in the 2017 Annual Threat Report; some successful, others not so much. So, what is at the core of any successful attack? If you understand the seven components of a ransomware campaign strategy, you can better defend yourself from one of the most pernicious forms of malware in history.
For those following along, over the past two months there have been several reports, warnings, blogs and other industry analyses suggesting that HTTPS inspection by security companies is actually weakening security. Those that know me well know that I am a huge proponent of performing HTTPS inspection. I found myself arguing against the recommendations of various advisories that suggest the very thing I have been saying, or rather preaching, for the past several years was now bad.
Email has been around since the 1970s. Today, everyone and every business uses email for their communications. To put things in perspective, according to Radicati group – 122 business emails were sent and received per user per day in 2015! That is a lot of email for humans to process without making a bad judgement call.
Times are extremely restless for security teams as they face highly motivated adversaries, and the onslaught of very active and progressive cyber-attacks. Today’s hacking techniques are stealthy, unpredictable in nature and waged by skillful attackers capable of developing innovative ways of circumventing security defenses. One new and more popular way that is becoming a status quo among malware writers today is the malicious use of encryption.
There is no end to the danger of cyber-criminal activities, as long as there is an underground marketplace that makes it almost impossible for authorities to intervene and enforce law and order. We continue to see our adversaries relentlessly going after money by developing and experimenting with different methods and tools against new and existing vulnerabilities, in preparation for the next phase of their business model.
If you pictured a specific technology exemplified as an animal what would it be? Cars have been visualized as horses and bulls and the names like Mustang, Pinto, and Taurus all ring a bell with us. We see this in cyber security as well. We have worms, bugs, and Trojan [horses] (I know that’s a stretch).
When the SonicWall community separated from Dell and announced our SecureFirst Partner Program 150 Days ago, we confirmed our commitment to 100 percent fulfillment through channel partners. Since then, more than 10,000 partners across 90 countries have registered as SonicWall resellers, including 2,000 new partners.
I cite these statistics not only as a testament to the global reach of SonicWall’s solutions but as a reminder of the heightened security landscape that causes businesses to seek out our partners and solutions in the first place.
Join SonicWall at CeBIT 2017 on the 20-24th of March, in Hannover, Germany.
With “Experience the Digital Transformation” as this year’s theme, IT Security will be at the forefront of the visitors’ agenda, alongside other leading-edge technologies, such as artificial intelligence, humanoid robots and applications of virtual reality. But security can’t be an afterthought!
I am honored to highlight my esteemed colleague, Steve Pataky, Vice President of Worldwide Sales at SonicWall, who was just named CRN Channel Chief – the Top 50 Most Influential Channel Chiefs of 2017. Steve not only brings with him more than 25 years of experience and an industry reputation for architecting and executing global channel and go-to-market strategies, but also a deep and genuine passion for helping partners succeed.
Since the release of SonicWall Capture Advanced Threat Protection (Capture ATP) in August 2016 on SonicWall firewalls, we have seen a lot of unique behavior from authors of malicious code, namely ransomware. Up until Christmas 2016, Locky received a lot of attention from security firms but then took a backseat during the holiday season.