Sometimes the ideas for innovations come from the simplest of places. One of the most tried-and-true methods to catch something is to set a trap, using something the target desires to lure them to a place where they can be caught.
The same methodology works in a place many may not think: cyber space. Just as a delicious piece of cheese could help catch a pesky mouse, the same idea can be used to catch a hacker – just replace the piece of cheese with a valuable-looking piece of information.
Deception technology has become a popular innovation to help protect enterprise networks. Symantec provides deception at scale, bringing deception capabilities to endpoint protection and capturing even the smartest of hackers. Deception capabilities enable customers to easily deploy customizable baits across the enterprise.
Deception technology deceives attackers into believing they have successfully breached an organization, when in reality, attackers are shunted to a false environment, served up fake assets and information – essentially leading them on a "wild goose chase" – while the security team works to neutralize the attack.
These decoys include fake credentials, files, and other enticing assets specific to that environment, that are incredibly granular in nature. Just as hackers have gone to the effort to make phishing emails as realistic looking as possible, these decoys mimic real assets inside the enterprise with the hopes of catching crooks.
When the hackers try to take one of these marked pieces, a precise alert is sent by the technology so that an agency can respond by strengthening the environment.
The Need for Innovation
This innovation, combined with other advances in endpoint connection, can help protect agencies in new and different ways. Tools such as Intensive Protection, Endpoint Detection and Response, and an overall integrated cyber defense platform, can help keep agencies safe.
As hackers continue to innovate to find new ways to break into systems those that must protect that data must innovate as well. It is no longer an option to simply put in perimeter defenses and hope they remain effective. Hackers have developed, and continue to develop, new forms of attack. To combat them, anyone that holds data needs to continue to look for the best security approaches, and be accepting of innovations that break the norm.
Sadly, with cyber security there is no end state. As long as hackers want to take information, agencies will have to continually improve their defenses. This is especially true for federal agencies that hold valuable personal information about the nation’s citizens, proprietary business information such as patents, and data critical to national security.
Innovation continues at all levels of cyber security. Sometimes simple ideas can turn into the best defenses. Agencies must understand that security will change, and more importantly, that it needs to change in order to stay one step ahead.
If you found this information useful, you may also enjoy:
We encourage you to share your thoughts on your favorite social platform.