Posted: 2 Min ReadFeature Stories

How to Get Hackers to Fall for an Old Ruse with a New Spin

Organizations can bolster endpoint security by deploying innovative deception technologies that leave attackers increasingly frustrated - and empty-handed

Sometimes the ideas for innovations come from the simplest of places. One of the most tried-and-true methods to catch something is to set a trap, using something the target desires to lure them to a place where they can be caught.

The same methodology works in a place many may not think: cyber space. Just as a delicious piece of cheese could help catch a pesky mouse, the same idea can be used to catch a hacker – just replace the piece of cheese with a valuable-looking piece of information.

Deception Technology

Deception technology has become a popular innovation to help protect enterprise networks. Symantec provides deception at scale, bringing deception capabilities to endpoint protection and capturing even the smartest of hackers. Deception capabilities enable customers to easily deploy customizable baits across the enterprise.

Deception technology deceives attackers into believing they have successfully breached an organization, when in reality, attackers are shunted to a false environment, served up fake assets and information – essentially leading them on a "wild goose chase" – while the security team works to neutralize the attack.

These decoys include fake credentials, files, and other enticing assets specific to that environment, that are incredibly granular in nature. Just as hackers have gone to the effort to make phishing emails as realistic looking as possible, these decoys mimic real assets inside the enterprise with the hopes of catching crooks.

When the hackers try to take one of these marked pieces, a precise alert is sent by the technology so that an agency can respond by strengthening the environment.

The Need for Innovation

This innovation, combined with other advances in endpoint connection, can help protect agencies in new and different ways. Tools such as Intensive Protection, Endpoint Detection and Response, and an overall integrated cyber defense platform, can help keep agencies safe.

As hackers continue to innovate to find new ways to break into systems those that must protect that data must innovate as well. It is no longer an option to simply put in perimeter defenses and hope they remain effective. Hackers have developed, and continue to develop, new forms of attack. To combat them, anyone that holds data needs to continue to look for the best security approaches, and be accepting of innovations that break the norm.

Sadly, with cyber security there is no end state. As long as hackers want to take information, agencies will have to continually improve their defenses. This is especially true for federal agencies that hold valuable personal information about the nation’s citizens, proprietary business information such as patents, and data critical to national security.

Innovation continues at all levels of cyber security. Sometimes simple ideas can turn into the best defenses. Agencies must understand that security will change, and more importantly, that it needs to change in order to stay one step ahead.

If you found this information useful, you may also enjoy:

You might also enjoy
Product Insights3 Min Read

How Deception is Going to Reshape Endpoint Security

Deception technology at the endpoint constitutes a new way to turn the tables on attackers. Here’s why.

About the Author

Chris Townsend

Vice President, Federal, Symantec

Chris leads a team dedicated to working with Federal agencies to improve their security postures, while reducing cost and complexity. With 20 years of experience, Chris is committed to advancing government cybersecurity.

Want to comment on this post?

We encourage you to share your thoughts on your favorite social platform.