CYBER Insights » THREAT INTEL: SOLARWINDS – Cyberattacks predominantly exploit the weakest links

THREAT INTEL: SOLARWINDS – Cyberattacks predominantly exploit the weakest links

Image Credit: DerWeg/Pixabay
Image Credit: DerWeg/Pixabay

Gibraltar: Friday 14 June  2024 at 09:30 CET

THREAT INTEL: SOLARWINDS – Cyberattacks predominantly exploit the weakest links in an organization’s security framework

By Andy Jenkinson – Guest Contributor |  Group CEO Cybersec Innovation Partners
via IainFRASER.net/CYBERInsights
SME Cyber Insights
Google Indexed on 140624 at 10:30 CET

#SMECyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #Cybercrime #CyberInsurance #DNS #PKI

THREAT INTEL: SOLARWINDS – Cyberattacks predominantly exploit the weakest links in an organization’s security framework

Cyberattacks predominantly exploit the weakest links in an organization’s security framework, with servers and domains being primary entry points.

The SolarWinds attack, the largest cyberattack to date, starkly illustrated this vulnerability, by leveraging a Not Secure subdomain and insecure DNS servers to infiltrate numerous high-profile targets.

Despite the glaring evidence, these critical areas remain inadequately secured, managed, and controlled.

Not Secure domains and servers offer easy access, yet organizations and security professionals continue to overlook these vulnerabilities, akin to playing Russian roulette with security. Maybe they have a vested interest…

This negligent approach invites cybercriminals and leaves sensitive data and systems at constant risk.

The imperative is clear: only by rigorously securing, managing, and controlling these primary entry points can we hope to contain and reduce the prevalence of cybercrime.

It’s a call to action for organizations to prioritize these vulnerabilities, transitioning from a reactive stance to proactive, comprehensive Internet Asset Security management.

WhitethornShield
FBI Cyber Division
The White House
Information Commissioner’s Office
National Security Agency
GCHQ
InternetSecurity
DNS
PKI

About Andy Jenkinson

Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.

Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience as a hands-on lateral thinking CEO, coach, and leader. A ‘big deal’ business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100’s £ millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world’s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.

Translate »