(Page 2 of 2)
What This Means for Enterprises
We caught up with Tom Cross, director of security research at Lancope, to get his take on the results. He told us a key takeaway from an enterprise security perspective is that breaches have an ongoing cost that can take a long time to manifest as intellectual property continues to be stolen from the organization and is put into practice competitively in global markets.
"This fact underlines the importance of disrupting, ongoing compromises inside of corporate networks even after perimeter security has been breached. Attacks are not over once the network has been compromised -- when an attacker breaches your network his work has just begun," Cross said.
"Attackers may seek to control and observe corporate networks for years in order to continuously collect strategically valuable intellectual property," he said. "Every organization should be engaged in efforts to identify compromises of this sort on their networks and disrupt them."
Posted: 2013-08-12 @ 12:22am PT
Start using VPN!!!!!
Posted: 2013-08-12 @ 12:09am PT
Great findings Jennifer. The latest breaches have yielded a veritable treasure trove of head-shaking security stories, all related to my favorite security soft spot -- people. The shimmer from our technological advances blinds us from the damage people can do -- and we remain so easily fooled. We've written a great article about this http://blog.securityinnovation.com/blog/2011/04/people-people-people.html