FEBRUARY 14, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Cashing in on Digital Information

Security for Home Users
Tips to Stay Safe from Threats This 2014

Security for Business
Defending Your Network Against Data Breaches



Security for Business

Defending Your Network Against Data Breaches

Threat actors will continue to target large enterprises and organizations because they’re a steady source of confidential data that can be used for sabotage and cyber espionage.”



Threat actors will continue to target large enterprises and organizations because they’re a steady source of confidential data that can be used for sabotage and cyber espionage. In fact, we believe that this year, we will see one major data breach incident per month. More than ever, enterprises need to tighten their security posture to protect against infiltration and data loss.

Reports of a data breach attack against popular retailers surfaced before 2013 ended. These resulted in the theft of several million shoppers’ credit card data. Similar wide-scale attacks can be prevented by putting security measures like using a locked-down system in place. This makes it harder for attackers to run malware on point-of-sale (PoS) systems. Although specific details on the attacks are not publicly available, system administrators and enterprises can use the incidents as cautionary tales. They should make it a point to tighten their networks’ security against data breach attacks so they won’t suffer the same fate.

Countermeasures and Best Practices

We encourage enterprises to use robust security solutions that can monitor network and system behavioral changes. Sadly, using an endpoint security solution is no longer enough to detect malicious activities in corporate networks.

The data breach incident could have been prevented if malicious internal network and data exfiltration traffic was detected. Had each attacked entity had its own incident response team—a special team made up of people with different functions within the organization that can manage, investigate, and contain security incidents—it would have done a better job of protecting its network. Because such a team is also in charge of gathering threat intelligence, which can be help an enterprise avoid future attacks, it might not even have been an easy target to begin with.

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: