Falsi miti sicurezza informatica Piergiorgio Venuti

False IT security myths: because backup, cloud, firewall and antivirus alone are no longer enough

Estimated reading time: 4 minutes

Introduction

Cyber security has become a major concern for businesses and individuals. With cyberattacks and data breaches on the rise, many still believe that solutions like data backup, cloud storage, firewalls, and antivirus are enough to protect their digital assets. However, these solutions alone are no longer enough to deal with today’s threats. In this article we will analyze why these solutions can no longer be considered adequate and what you can do to improve your IT security.

The backup myth

Data backup has always been one of the pillars of any IT security strategy. Having a copy of your data allows you to restore them in the event of a ransomware attack or malfunctions. However, backup alone is no longer enough in the face of today’s Advanced Persistent Threats (APTs).

APT attacks expect hackers to remain hidden on the victim’s network for up to months, silently exfiltrating valuable data before being detected and neutralized. In these cases, the backup will contain a copy of the already compromised data, making it useless. Also, if hackers’ access is not eliminated, they will still be able to continue accessing the network and newly created backups. It is therefore necessary to integrate backup with active network monitoring solutions to identify and block this type of threat.

The false myth of the Cloud

Cloud storage is often seen as a way to increase data security, thanks to the redundancy and protection provided by providers. However, moving data to the cloud does not in itself improve cybersecurity. The attack surface simply moves from internal servers to those of the cloud provider. Also, the basic security offered by most providers only covers the protection of the cloud infrastructure, but does not analyze the data content for threats.

Encryption and data access policies must be implemented and managed by the customer. In case of a ransomware attack that encrypts your files, they will remain inaccessible even if they are in the cloud. It is therefore necessary to integrate additional security services to truly protect data in the cloud, as well as train personnel on the correct configuration of access policies.

The false myth of the Firewall

Firewalls are a crucial element for defining the perimeter of the corporate network and controlling incoming and outgoing traffic. However, a traditional firewall alone is no longer enough to block today’s cyberthreats. This for two main reasons:

  • Many attacks occur using legitimate channels that are allowed by the firewall, such as email, websites and file sharing. The firewall controls only the communication channel, not the conveyed content.
  • Insider threats—attacks originating from compromised employees or devices already on the network—bypass the firewall completely.

To improve protection, it is necessary to adopt new generation firewalls with advanced functions such as IPS (Intrusion Prevention), sandboxing and advanced threat protection to also control the contents conveyed by the network. You also need internal network monitoring tools.

The false myth of the Antivirus

Antiviruses are essential for protecting endpoints such as PCs, laptops and servers from malware such as viruses, ransomware, spyware, trojans and worms. However, even traditional antivirus alone is no longer enough to stop today’s advanced threats. The reasons are two:

  • They rely on signature databases of known malware, and are therefore ineffective against new, unknown threats.
  • They can be fooled or disabled by advanced malware.

To improve the level of protection, enterprises should equip themselves with next-generation antiviruses that incorporate artificial intelligence and machine learning to detect even unknown threats based on their anomalous behavior, as well as signature databases. Furthermore, these advanced antiviruses adopt self-protection techniques to prevent deactivation.

Conclusion: The need for a modern integrated approach

As we have seen, solutions such as backup, cloud, firewalls and antivirus – while still important – are no longer sufficient by themselves to protect businesses and users against today’s advanced and constantly evolving cyberthreats.

Serve invece un approccio stratificato e moderno che integri: protezione avanzata degli endpoint, monitoraggio attivo 24/7 della rete per rilevare minacce interne ed esterne, formazione continua del personale, backup crittografati e immutabili, e server e postazioni separate per limitare l’impatto di eventuali attacchi.

In this context, services such as Secure Online Desktop SOCaaS, which combine professional 24/7 monitoring of the corporate network with threat analysis via a modern Security Operation Center, and advanced endpoint protection, can significantly improve the level of security for companies and organizations.

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • CyberDanube Security Research 20241219-0 | Authenticated Remote Code Execution in Ewon Flexy 205 December 22, 2024
    Posted by Thomas Weber | CyberDanube via Fulldisclosure on Dec 21CyberDanube Security Research 20241219-0 ------------------------------------------------------------------------------- title| Authenticated Remote Code Execution product| Ewon Flexy 205 vulnerable version|
  • Stored XSS with Filter Bypass - blogenginev3.3.8 December 19, 2024
    Posted by Andrey Stoykov on Dec 18# Exploit Title: Stored XSS with Filter Bypass - blogenginev3.3.8 # Date: 12/2024 # Exploit Author: Andrey Stoykov # Version: 3.3.8 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2024/12/friday-fun-pentest-series-16-stored-xss.html Stored XSS Filter Bypass #1: Steps to Reproduce: 1. Login as admin and go to "Content" > "Posts" 2. On […]
  • [SYSS-2024-085]: Broadcom CA Client Automation - Improper Privilege Management (CWE-269) December 19, 2024
    Posted by Matthias Deeg via Fulldisclosure on Dec 18Advisory ID: SYSS-2024-085 Product: CA Client Automation (CA DSM) Manufacturer: Broadcom Affected Version(s): 14.5.0.15 Tested Version(s): 14.5.0.15 Vulnerability Type: Improper Privilege Management (CWE-269) Risk Level: High Solution Status: Fixed Manufacturer Notification: 2024-10-18 Solution Date: 2024-12-17 Public Disclosure:...
  • [KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities December 17, 2024
    Posted by Egidio Romano on Dec 16--------------------------------------------------------------------------- GFI Kerio Control
  • RansomLordNG - anti-ransomware exploit tool December 17, 2024
    Posted by malvuln on Dec 16This next generation version dumps process memory of the targeted Malware prior to termination The process memory dump file MalDump.dmp varies in size and can be 50 MB plus RansomLord now intercepts and terminates ransomware from 54 different threat groups Adding GPCode, DarkRace, Snocry, Hydra and Sage to the ever […]
  • APPLE-SA-12-11-2024-9 Safari 18.2 December 12, 2024
    Posted by Apple Product Security via Fulldisclosure on Dec 12APPLE-SA-12-11-2024-9 Safari 18.2 Safari 18.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121846. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Safari Available for: macOS Ventura and macOS Sonoma Impact: On a […]
  • APPLE-SA-12-11-2024-8 visionOS 2.2 December 12, 2024
    Posted by Apple Product Security via Fulldisclosure on Dec 12APPLE-SA-12-11-2024-8 visionOS 2.2 visionOS 2.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121845. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Crash Reporter Available for: Apple Vision Pro Impact: An app may […]
  • APPLE-SA-12-11-2024-7 tvOS 18.2 December 12, 2024
    Posted by Apple Product Security via Fulldisclosure on Dec 12APPLE-SA-12-11-2024-7 tvOS 18.2 tvOS 18.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121844. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleMobileFileIntegrity Available for: Apple TV HD and Apple TV 4K (all […]
  • APPLE-SA-12-11-2024-6 watchOS 11.2 December 12, 2024
    Posted by Apple Product Security via Fulldisclosure on Dec 12APPLE-SA-12-11-2024-6 watchOS 11.2 watchOS 11.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121843. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleMobileFileIntegrity Available for: Apple Watch Series 6 and later Impact: A […]
  • APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2 December 12, 2024
    Posted by Apple Product Security via Fulldisclosure on Dec 12APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2 macOS Ventura 13.7.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121842. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Apple Software Restore Available for: macOS Ventura Impact: An […]

Customers

Newsletter

{subscription_form_1}