sb-au logo
Story image

It's not all about the network: How to protect your outbound data

01 May 2017

While many organisations focus on the obvious security vulnerabilities in their businesses such as network perimeters, there is one vulnerability that constantly gets overlooked: outbound data.

That’s the word according to Brennan IT, which says that outbound communications is the more important part of the security equation.

Dayle Wilson, general manager, operations, Brennan IT, said, “The industry has done a good job educating businesses about the importance of preventing inbound attacks. What’s misunderstood generally is the importance of outbound data. When businesses consider security, they must do so from both an inbound and an outbound perspective,” comments Brennan IT’s general manager of operations, Dayle Wilson.

He believes that the inbound perimeter protection might be good, but most networks are still likely to be breached. So how do organisations control the damage? Contain it and prevent the attacker from conducting outbound communications.

“It’s those outbound communications that let the hacker download the payload, whether that’s a piece of malware or ransomware. By blocking that outbound communication, the business can stop the cybercriminal from downloading that payload, rendering the attack useless,” he says.

The problem comes when organisations don’t really understand how to prevent outbound communications. That prevents them from putting strong security measures in place. Proxy servers are one way to block outbound traffic.

Wilson says that most organisations are reluctant to use proxy servers because they can block access to access websites such as non-business related sites and Facebook.

“The impact on the user experience attracts a lot of complaints, so IT managers often open up a port here or there so users can access their favourite sites. This defeats the purpose of the proxy server, which can be an extremely effective way to protect a company’s data both in the cloud and on-premise,” he says.

“Organisations need to remember that protecting outbound communication is the single most important aspect of neutralising attacks. Implementing a transparent proxy server is the most effective way to do that,” he concludes.

Story image
Leader wins Acronis distribution agreement, brings cyber protection solutions to Aus
The agreement covers the entire Acronis Cyber Protect Cloud solution portfolio, which includes cybersecurity, backup, disaster recovery, secure file sync and share, as well as notary services.More
Story image
Quantum extends Veeam partnership in a bid to protect against ransomware
“Quantum continues to expand its partnership with us and we are pleased to add ActiveScale object storage to a select group of S3 targets that can provide robust ransomware protection for our joint customers."More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
CSO Group scores AU$16m deal with NSW Government
The deal focuses on the refresh and uplift of cybersecurity capabilities and technologies for the cloud, endpoint and email, leveraging the recently launched CSO Managed Security Service.More
Story image
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.More
Story image
Microsoft adds new ways to bring AI to the edge with Azure Percept
"The goal of the Azure Percept platform is to simplify the process of developing, training and deploying edge AI solutions."More