May 15, 2018//Ellen NeveuxLast Updated: November 19, 2020
At the beginning of 2018, experts in the cybersecurity field predicted that bad actors attacking surfaces would continue to be a huge trend. Along the same lines, it’s widely accepted that hackers will take the easiest route available to either breach data, place a form of malware on a network, or just cause disruption. When and if the path of least resistance is blocked, bad actors will work to find a new way to get in. In other words, bad actors are pretty quick on their feet when finding a new surface to attack when one path leads to a dead end.
So, it is imperative to not have any paths on your network that could lead a hacker to sensitive information; this is easier said than done. However, to best understand how to protect yourself, first, it’s important to understand what an attack surface is and how the right secure remote access platform can safeguard your network from bad actors.
Defining attack surfaces
Wired defines an attack surface as the total number of points or vectors through which an attacker can try to enter an environment or network. In terms of cybersecurity, this means how a bad actor could gain access to your network to either send, extract, or encrypt data through the holes they find in a network. TechTarget adds that every network interaction point allows for a potential network attack surface. In other words, an attack on a surface occurs when bad actors are able to find holes in a network which then allows them to cause disruption. This disruption can come in the forms of data breaches, ransomware, and more.
With bad actors taking advantage of the access that an enterprise organization grants to a third-party, the bad actor will pick the surface that gets them onto a network the easiest. No matter which route the bad actor takes to get onto the network, as soon as they’re in they will cause mayhem.
Some of the most common attack surfaces are:
Bad actors actively look for the most common surfaces to attack and regularly use the access granted to a third-party to get into the network. Without the right secure remote access that can protect a networks different access points, bad actors can and will take advantage of the sensitive information they can get their hands onto.
An attack surface example
One of the most notable ransomware attacks was the infamous City of Atlanta fiasco. According to Data Breach Today, whoever attacked Atlanta gained access to their system through a surface that led them to getting ahold of administration credentials. From there, the attacker was able to spread malware onto a server. In the Data Breach Today article, information security researcher Kevin Beaumont notes that Atlanta left RDP port 3389 and block port 445 open to the Internet.
When Atlanta left the two ports open to the Internet, it was essentially an invitation for bad actors to get onto their network. As we know, Atlanta didn’t pay the ransom and the city is now expected to pay $2.6 million toward recovery. Without the right secure remote access platform to safeguard your network and sensitive information, you could be the next Atlanta.
Protect your surfaces
According to a survey IBM conducted with the help of IT professionals, 75 percent of respondents don’t have a formal plan in place if an attack happens while 66 percent were unsure if they could ever recover from an attack if one were to happen. This is an obvious issue among IT professionals, so what can we do to fix this? The first step is to start to catalog of all points of entry into your network. Prioritize which points present the greatest security vulnerability so that you can protect yourself as well as you can. Some of the best practices to implement, along with the first steps, according to security professionals include:
Understanding your network’s exposure to the outside world and the possibility of a breach gives you a lot of valuable context and help. Along with that, it is widely known that it’s much easier for an attacker to find vulnerabilities in the defenses of a network that has a lot of data interfaces than a network that only has a few very controlled access points. SecureLink’s secure remote access software offers the tools necessary to combat an attack surface, no matter the number of data interfaces and access points.
Get the right secure remote access software
Our sole focus is secure third-party remoteaccess. For highly regulated enterprise organizations, SecureLink Enterprise has pioneered a secure remote access platform. SecureLink for enterprise allows an organization to identify, control, and audit third-party vendors. For vendors, SecureLink is the gold standard remote access support platform because it is easy, efficient, and ensures compliance and reduces liability when supporting customers.