SME horizon

Protecting against data breaches

Photo by cottonbro

Imperva, Inc. has warned of the fragmented ecosystem of cyber defense controls that risks exposing enterprises to increasingly troubling data breaches.

With lessons gleaned from analyzing 100 data breaches globally and drawing from direct experience partnering with enterprises in Asia-Pacific, it also issued advice to better safeguard against today’s threats.

In 2022, the Imperva Threat Research Team analysed over 100 of the largest and most well-known data breaches. The study revealed that a greater number and higher frequency of breaches has occurred in the last decade. An increasing amount of stolen data is being exposed and sold on the dark web.

Often, this is used in extortion attempts, to commit financial fraud, and as fuel to create phishing and other social engineering campaigns, which in turn leads to more data breaches.

Data breaches are caused by a variety of issues – such as poor security practices like using unprotected publicly accessible services (Microsoft, Advanced Info Service) or weak authentication. Some victims also suffer a large fallout from a seemingly small error, such as forgetting about data left behind in temp files from ETL jobs and storing database passwords in clear text.

As enterprises turn to the cloud or work with partners already on the cloud, they are finding that the new IT environment requires a different and often more sophisticated set of controls to adequately secure. Microservices, open-source code, and API are used when developing modern applications.

Combined, these add to the cyber security challenge by organically widening an organisation’s risk footprint, often doing so without the organisation’s awareness. 

The common practice of using disparate cybersecurity tools also leave gaps in an organisation’s ability to identify and mitigate threats.

Common security issues in Asia-Pacific enterprises

In interactions with customers in the region, Imperva has identified specific vulnerabilities that often go unattended or are inadvertently introduced:

“These issues are hard to mitigate because most SOC teams do not have access to data-centric logging telemetry that tells them what is happening on a granular level, from the application/API layer all the way down to the database access level,” said Reinhart Hansen, Director of Technology, Office of the CTO, Imperva. “Organisations are flying blind when it comes to identifying anomalous and abusive data access that could be a data breach in flight or a key indicator that a breach is about to happen.”

A data-centric approach to data security

To overcome today’s complex cybersecurity challenges, enterprises have to go beyond network and endpoint security to adopt a data-centric security strategy.

This means focusing on the lifecycle of the data they are responsible for. It is important to know where the data is, who is accessing it and why, and how frequently. The more that an enterprise can map out how users should be interacting with their data, the easier it is to detect threats, regardless of the source. Specifically, they should:

“In most of the breaches analysed by Imperva, the lack of in-depth security stands out as the main reason,” said Hansen. “Actions organisations can take to tangibly improve their security posture include reducing the attack surface through better database security, separating their database and application servers, and diluting excessive privileges from key users.”

Exit mobile version