How to defend your organization against hackers during this pandemic period
Recommendations for SMEs
StreamScan is a Quebec company specializing in signal detection solutions for cyberattacks. Our patented solution is deployed in several companies in Quebec and allows us to follow in real time the passage of these in telework mode as well as the evolution of the flows of cyberattacks since the beginning of the crisis.
The state of play
Here is our observation on the current situation and the solutions we offer to SMEs to minimize the risks of cyber attacks.
- Overall, the number of cyber attacks has not slowed in the past three months. The majority of attacks we see are automated and target all organizations without discrimination. Without question, StreamScan predicts a dramatic increase in the number of attacks in the coming months.
- We see many attacks of different types:
- Phishing attempts
- Unauthorized multiple connection attempts (VPN, RDP, etc.)
- Distribution of ransomware
- Attempts to remotely exploit existing vulnerabilities in networks
- Denial of service attacks tending to paralyze networks
3. The majority of SMEs are not equipped to detect cyber attacks linked to telework. Conventional security solutions (antivirus / firewall) cannot detect the type of attacks named above.
4. Currently, many organizations go into telework mode without even following basic cybersecurity best practices. It must be understood that telework opens the door to new scenarios of cyberattacks and therefore, companies are more likely to be hacked.
Recommendations for SMEs
To defend its IT infrastructure, it is first and foremost essential to be able to identify the cyberattacks that target us. Otherwise, it is impossible for an organization to defend itself against what it does not see. StreamScan recommends implementing a behavioral IDPS-type solution that can detect any type of cyber attack and abnormal behavior.
Give yourself the ability to detect all types of attacks:
- VPN attack
- Attack on RDP protocol
- Injection of malicious codes
- Intrusion attempt
- Brute force attack
- Ransomware
- Exploitation of vulnerabilities
- Abnormal behaviors
- Data exfiltration