83% of IT security professionals remain confident in their perimeter security tools, including firewalls, to defend against sophisticated cyber attacks, a new survey reveals. Ultimately, this assumption could be placing both consumer and business data at risk.
The study, which was conducted at Microsoft Ignite in May 2015 and measured the attitudes of nearly 150 IT professionals, also revealed 29 percent of those surveyed do not feel confident that their IT teams would have the ability to detect an intruder attempting to breach their network. However, this could be a result of the tools they are using not having the capability to detect today’s stealthy hackers.
Commenting on the survey findings, Philip Lieberman, CEO of Lieberman Software, said: “Next generation firewalls, intrusion detection systems and the like can be potent deterrents to known dangers. But when it comes to advanced zero day threats and precisely targeted phishing attacks, perimeter security tools are ineffective. Companies still relying on these solutions to protect against today’s advanced cyber attacks should prepare for the consequences.
”Other findings from the study revealed that when an intruder is detected on an organizations network the most common mitigation technique is for IT staff to take manual action to stop them carrying out further malicious activity.
“Competent attackers are capable of quiet intrusions and the take-over of existing credentials found on compromised systems,” Lieberman said. “With that in mind, we recommend regular reboot of systems, discontinuance of the use of domain administrator accounts, regular invalidation of Kerberos tickets to force re-authentication, and the use of very short lifetime credentials for passwords, SSH keys and certificates used for authentication.”
”We also recommend automating privileged identity management and removing humans from the process of service account password changes,” Lieberman continued. “This reduces the manual burden placed on IT staff and helps overcome automated cyber attacks that nest within environments, hoping to use long lived administrative passwords.”
For more information on the survey, click here.