Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
Anthony Grieco
Anthony Grieco

Why Poor Cyber Hygiene Invites Risk

Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain.

Organizations around the world are implementing mobility, cloud computing, the Internet of Things (IoT), business intelligence, and social media technologies at breakneck speeds in order to remain competitive and relevant in today’s digital economy. However, with the rapid implementation of these technologies, new weak spots are emerging for attackers to exploit. And those adversaries are becoming progressively more sophisticated, launching threats that are increasingly pervasive and harder to detect.

The challenge with many digitally disruptive technologies is that security is often an afterthought. Couple this with the fact that we’re seeing these devices often being connected to infrastructure that is not up to today’s cybersecurity demands, and we have a significant problem on our hands.

Businesses that want to add emerging technologies such as IoT to their networks need to regularly assess their cyber hygiene and the resilience of their existing infrastructure. It’s clear that hackers are well aware of how prevalent unpatched and outdated solutions are within organizations and how these aging technologies leave them vulnerable.

Take, for example, the string of ransomware attacks earlier this year. Hackers exploited vulnerabilities within Jboss servers that were identified five years ago to aid in delivering ransomware attacks. From this vulnerability alone, approximately 3.2 million machines were at risk of infection, and more than 2,100 compromised systems were already present at the time of the investigation.

In its 2016 Midyear Cybersecurity Report, Cisco found that more than more than 90% of devices across customer environments had known vulnerabilities in the software they were running. Additionally, the company found that almost all of its sampled routers and switches on the Internet — had, on average, 28 known vulnerabilities. The devices had been running known vulnerabilities for an average of 5.6 years. More than 23% of these devices had vulnerabilities dating back to 2011, nearly 16% had vulnerabilities that were first discovered in 2009, and almost 10% had known vulnerabilities older than 10 years.

Source: Cisco Midyear Cybersecurity Report
Source: Cisco Midyear Cybersecurity Report

Despite a growing awareness of the threats that target them, some organizations still aren’t practicing some of the fundamental steps of cybersecurity to ensure the level of resiliency needed to endure current threats. It is imperative for organizations to prioritize addressing the problem of aging infrastructure and systems. This isn’t just about patching old vulnerabilities that have been left to fester, but also assessing the overall strength and resilience of the deployed infrastructure and systems. The time has come for organizations to realize that they must move away from products that are no longer supported and can’t be upgraded to meet today’s security challenges.

Modern cybersecurity is about risk management — that is, eliminating and mitigating risks where possible, and knowingly accepting those that remain. Poor cyber hygiene — not patching, keeping outdated solutions in place, etc. — puts the overall resilience of an organization into jeopardy.

What Can You Do Today to Reduce Cyber Risks?

1. Reduce attackers’ time to operate: Attackers’ campaigns often take advantage of known vulnerabilities and can remain active and undetected by their victims for days, weeks or longer. Know what is in your network and deploy the basics — patching, password management, and segmentation — to impede lateral movement and propagation.

2. Improve your network hygiene: Upgrade aging infrastructure and systems, patch quickly, and consistently back up your data.

3. Conduct a risk-focused evaluation of the existing hardware and software:  Rank products in terms of which ones create the most effective, essential value, and determine how much risk each product brings on based on its age, vulnerabilities, and cyber resilience. With this, organizations can develop a prioritized list for updated technology investments with resilience built in.

In the end, it’s not enough just to patch old vulnerabilities or buy the latest security solution to address a specific threat. Organizations have to assess the overall strength and resilience of their infrastructure and systems to face fast-moving and aggressive threats. It’s time to move away from products that are no longer supported and can’t meet today’s cybersecurity challenges, and time to embrace a risk-based approach to cybersecurity.

Related Content:

Anthony Grieco is a senior director and trust strategy officer at Cisco. Anthony Grieco leads the Trust Strategy Office and is responsible for helping countries with security strategy and planning that ensure trust as they look to digitize key industries and government. ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.