Companies at risk of unauthorised access to critical data

Research reveals how criminals target fax machines to take over networks and spread malware
Research reveals how criminals target fax machines to take over networks and spread malware.
Companies at risk of unauthorised access to critical data
Companies at risk of unauthorised access to critical data

Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies. Although in recent attacks customers have not necessarily suffered any financial losses, this could quickly change with personal and financial information in the hands of cybercriminals.

Ensuring the integrity of company data is not a simple task, especially as cybercrime, fraud and data breaches are on the increase. Today, both small and large companies need world-class security solutions to safeguard confidential information, ranging from internet threat protection to policy control for secure web traffic.

Businesses need proper protection against cyber threats and intellectual property leaks whilst also ensuring compliance with corporate content and access policies. Network and user activity monitoring is crucial as threats are not always external, companies need to secure all roaming users and mobile devices.

Troye technical director Kurt Goodall points to a number of defense mechanisms to protect one’s business from threats. “These could include malicious URL requests, viruses, Advanced Persistent Threats (APTs), zero-day malware, adware, spyware, botnets, cross-site scripting, and much more.”

“Troye provides a world-class Web Application Firewall which is ICSA, Common Criteria and FIPS-certified. It analyses bi-directional traffic including SSL-encrypted communication, protecting customers against a broad range of security threats,” he explains.

Goodall says there are tools to perform deep-packet inspection of HTTP, HTTPS and XML, as well as protection against OWASP, SQL injection attacks, cross-site scripting attacks, and cookie tampering. “One should also do form validation and protection, HTTP and XML reply and request format validation, plus JSON payload inspection, signature and behaviour based protections, and data loss prevention (DLP).”

“In addition, one should do traffic monitoring for intended and unintended data exposure, Denial-of-Service (DoS) protection, authentication, authorisation and auditing support and reporting, and policy tools that provide for easier PCI-DSS compliance verification,” he warns.

Troye’s solutions which include the Citrix NetScaler ADC/WAF provide for unmatched security, superior Layer 4 – Layer 7 (L4-L7) load balancing, reliable GSLB, and increased uptime. Performing application-specific traffic analysis to intelligently distribute, optimise and secure L4–L7 network traffic for web applications, helps prevent Application Layer attacks.

The Application Delivery Controller (ADC) allows legitimate client requests whilst blocking malicious requests. It provides built-in defenses against DoS attacks and supports features that protect against legitimate surges in application traffic that would otherwise overwhelm the servers.

“An available built-in firewall protects web applications from Application Layer attacks, including buffer overflow exploits, SQL injection attempts, cross-site scripting attacks, and more. In addition, the firewall feature provides identity theft protection by securing confidential corporate information and sensitive customer data,” he concludes.


Edited by Daniëlle Kruger

Follow Daniëlle Kruger on Twitter

Follow IT News Africa on Twitter