Intelligent CIO Middle East Issue 104 | Page 23

LATEST INTELLIGENCE scanning its broad set of internet-connected devices , applications , security tools like VPNs and firewalls – which have become primary attack vectors – and other routable infrastructure and networking resources . 2 ) Next , attackers will work to compromise a device , commonly by deploying a malicious payload or by compromising user credentials by way of social engineering . 3 ) This forms a beachhead , from which cybercriminals then scan the network environment to discover other exploitable resources , use them to move laterally , escalate privileges , and discover and exploit crown jewel applications – those with sensitive and business-critical data . 4 ) Finally , attackers steal and encrypt data , extorting the business to pay .
The best ransomware defense aligns with these attack stages . Enterprises must work to eliminate or dramatically shrink the external attack surface , prevent compromise across their devices , resources , and applications , stop lateral movement , and prevent data loss . Here , we will see how implementing a zero trust architecture helps achieve these goals across the attack chain . p
Download whitepapers free from www . intelligentcio . com / me / whitepapers /
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 23