Join Attivo and be a Champion during Cyber Security Awareness Month
[vc_row parallax=”” parallax_image=”” row_type=”row” type=”full_width” anchor=”” in_content_menu=”” content_menu_title=”” content_menu_icon=”” text_align=”left” video=”” video_overlay=”” video_overlay_image=”” video_webm=”” video_mp4=”” video_ogv=”” video_image=”” background_image=”” section_height=”” background_color=”” border_color=”” padding=”” padding_top=”” padding_bottom=”” more_button_label=”” less_button_label=”” button_position=”” color=”” css_animation=”” transition_delay=””][vc_column width=”1/1″][vc_column_text]By: Carolyn Crandall, Attivo CMO
Attivo Networks is proud to participate in the National Cyber Security Awareness Month (NCSAM) Champion Program. Created under the leadership of the U.S. Department of Homeland Security and the National Cyber Security Alliance, the goal of NCSAM is similar to a core Attivo corporate goal: raising awareness about the number and sophistication of BOTs and advanced persistent threats (APTs) that target our critical information every day.
Champions include companies and organizations of all sizes, schools and school districts, colleges and universities, nonprofits, government organizations and individuals. Champions pledge to educate and build awareness of today’s threats both within their institutions and with their key audiences. Sample activities include:
- Hanging posters and sharing tips about how employees can help to protect personal information
- Challenge employees to explain what cybersecurity means to the organization and the critical role staff play
- Share tips and resources on social media using the hashtag #CyberAware
- Participate in one of the #ChatSTC Twitter chats every Thursday in October at 3 p.m. EDT/noon PDT
Becoming a Champion aligns with the Attivo focus on providing organizations continuous detection of attackers along with full forensics on BOT and APT activities for the threat intelligence to quash current attacks and protect against future ones.
It’s a bit ironic that a hacker bases their attack on deception and it is with the new generation of deception technologies that are going to be detected, trapped, and their attacks shut down. High interaction, active deception is not reliant on known attack patterns or signatures, instead a deception platform combines engagement servers and luring techniques designed to attract and engage attackers before they can find company servers or mount their attack.
Attivo bases its solutions on real operating system-based deception solutions, which offer dramatically better authenticity over emulated solutions. The company also includes a full suite of services and can be completely customized to an organization’s IT environment. Given the speed with which networks change, emulation is often too easy for the hacker to detect, defeating the purpose of the solution.
Information is a core asset of many organization, and if breached could cause material financial and damage to the company’s brand. With over one billion records stolen and 600 breaches this year alone, threats will continue to proliferate and are clearly growing in their sophistication. With reports of 9 out of 10 companies admitting that their prevention solutions failed, and that they were breached, it is time to look at deception technologies as a critical part of every organizations’ continuous detection and defense strategy. If you’d like to learn more, come and see us at one of IANS Security Forums over the next few weeks:
Free Active Directory Assessment
Get Visibility Into Privilege And Service Account Exposure
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.
Try Our Endpoint Detection Net (EDN) for Free
FAST AND EASY
Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.
ADSecure 90-Day Free Trial
GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY
- Hide and deny access to AD objects
- Get alerted on unauthorized queries
- Attack details easily viewable in dashboard
- Your data remains on-premise