Story image

It's not all about the network: How to protect your outbound data

01 May 2017

While many organisations focus on the obvious security vulnerabilities in their businesses such as network perimeters, there is one vulnerability that constantly gets overlooked: outbound data.

That’s the word according to Brennan IT, which says that outbound communications is the more important part of the security equation.

Dayle Wilson, general manager, operations, Brennan IT, said, “The industry has done a good job educating businesses about the importance of preventing inbound attacks. What’s misunderstood generally is the importance of outbound data. When businesses consider security, they must do so from both an inbound and an outbound perspective,” comments Brennan IT’s general manager of operations, Dayle Wilson.

He believes that the inbound perimeter protection might be good, but most networks are still likely to be breached. So how do organisations control the damage? Contain it and prevent the attacker from conducting outbound communications.

“It’s those outbound communications that let the hacker download the payload, whether that’s a piece of malware or ransomware. By blocking that outbound communication, the business can stop the cybercriminal from downloading that payload, rendering the attack useless,” he says.

The problem comes when organisations don’t really understand how to prevent outbound communications. That prevents them from putting strong security measures in place. Proxy servers are one way to block outbound traffic.

Wilson says that most organisations are reluctant to use proxy servers because they can block access to access websites such as non-business related sites and Facebook.

“The impact on the user experience attracts a lot of complaints, so IT managers often open up a port here or there so users can access their favourite sites. This defeats the purpose of the proxy server, which can be an extremely effective way to protect a company’s data both in the cloud and on-premise,” he says.

“Organisations need to remember that protecting outbound communication is the single most important aspect of neutralising attacks. Implementing a transparent proxy server is the most effective way to do that,” he concludes.

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.