Intelligent CIO Africa Issue 50 | Page 76

FINAL WORD now often co-opted by malicious attackers as well . Such files enable IT departments to gain remote access to another computer to solve issues , but they can also be used to place malicious files on another system .
Double extortion
Many attackers are not only causing widespread disruption to business operations but are also stealing large quantities of sensitive data before issuing ransom demands . These are known as ‘ double extortion attacks ’ and create significant problems for organisations that have to deal with the disruption , as well as the threat of important information such as intellectual property and trade secrets being publicly released . These types of attacks also risk reputational damage to targeted organisations and decrease customer confidence .
Defending against attacks
Fady Younes , Cybersecurity Director ,
Middle East and Africa , Cisco
Rather than activating ransomware on the first successfully compromised system , attackers now leverage the infected system as an initial access point into the network . Once this is established , they can then move across the network to gain additional systems and privileged access to critical network infrastructure .
Although threats have evolved over the course of 2020 , the good news is many of the security controls recommended for other types of attacks remain effective against the likes of ‘ big-game hunting ’ and ‘ double extortion attacks ’. As a precaution , businesses should use a defence-in-depth approach to securing networks . Companies should focus on network defence , which includes prevention , detection and fast response . As a result , failure of one layer will not result in an inability to react to other threats .
Cisco Secure offers a number of security solutions that not only address security concerns based on key trends but can also be tailored to meet the specific requirements of a business . These products integrate seamlessly with the Cisco SecureX platform and include Cisco Secure Network Analytics , Cisco Secure Endpoint , Cisco Secure Firewall , Cisco Secure Email and more . Each of these solutions helps to secure areas where ransomware attackers may attempt to exploit . p
76 INTELLIGENTCIO AFRICA www . intelligentcio . com