Story image

Four key steps to improving your cyber defence capabilities

17 Aug 2017

Article by Jim Cook, Malwarebytes A/NZ country manager  

You don't have to talk to many IT professionals to realise the business world is suffering from a bad case of breach fatigue.

Constant reports of new threats and successful intrusions are failing to generate the attention they once did and some feel the battle can't be won.

To ensure organisations have effective security strategies in place, they need to rethink the concept of "protection".

There needs to be less of a focus on building walls around entire IT infrastructure, and instead, looking at creating a capability to detect and respond to threats in a much more agile way.

The approach, dubbed cyber defence, is the cyber security discipline focused on the prevention and detection of cyber attacks by determined adversaries.

Its purpose is to reduce the time it takes to detect attacks and then carry out an appropriate response. A successful cyber defence strategy has four key areas: preparation, prevention, detection and response.


Thorough cyber defence preparation needs to start at the very top of an organisation. Board members and senior management need to clearly communicate that cyber security is a top company priority. All staff must understand why this is the case and their roles in making it a reality.

Once awareness has been generated, a cyber-resilience program should be undertaken that can translate strategy into practical programs in every area.

People must be aware of what's required on a day-to-day basis to reduce the likelihood of breaches and neutralise them should they occur.

The organisation also needs to ensure it has two types of threat intelligence in place. The first is tactical intelligence which provides automatic indicators that an event has occurred.

These can be so-called 'atomic indicators', such as IP addresses or URLs, or 'structured' indicators such as STIX, TAXI or OpenIOC.

The second type is strategic threat intelligence. This involves human analysis of the threats and focuses on understanding the threat actors, their objectives and technical strengths.

This can be helpful to monitor security sources and vendors for fresh information using services such as Twitter and RSS feeds.


Once thorough preparation has been undertaken, attention should shift to threat prevention. This involves the evaluation and deployment of a set of tools and services deemed to be the best fit for the organisation.

Often, there can be a time lag between an incident occurring and it being detected. For this reason, having tools that can provide an automated immediate response is important. This can then be followed with deeper analysis by security professionals.

Also, if repetitive security response tasks can be automated, this can ensure rapid responses are made to commodity attacks.

This prevents the need to carry out laborious checks and standard fixes, security staff can be freed up to focus on targeted attacks that can potentially cause more harm to the organisation.


Effective detection of threats that make it into an organisation's IT infrastructure is reliant on the security team knowing which assets are most critical to the organisation. These assets are likely to include data, applications and business processes.

Focus can then be placed on these assets rather than trying to protect the entire organisation with perimeter defences.

Such detection also needs to cover the potential for insider threats and lateral movement between systems. Not all security threats come from outside.

Security teams should also consider deploying endpoint detection and response tools. These can reduce the time it takes for threat validation and investigation from days or hours to minutes and even seconds.


Finally, security teams need to consider how they will respond to threats that emerge. Here, it's important to realise that no one has to work alone.

It can be advantageous to retain the services of an external security company to advise on the best course of action and assist with the response.

It's also important not to end up playing 'whack a mole' by being constantly in a reactive mode. Having in place proactive measures and techniques that can swing into action when required is vital.

By following this four-stage approach, security teams can be confident they have the cyber defence capabilities in place that will protect their organisation from the rising number of threats appearing in the wild.

Through focusing on preparation, prevention, detection and response, they will be best placed to ensure critical systems and data remain protected at all times.

Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.