Among the most worrying cybersecurity risks currently facing organizations are those created by supply chain attacks, which have become an effective way for hackers to gain access to IT networks at scale. Take the recent Kaseya incident, for example, which saw attackers breach its security and issue malicious software updates containing ransomware to around 50 of its Managed Service Provider (MSP) customers.
The domino effect didn’t stop there and a further 1,500 customers of those MSPs were similarly breached. Data was encrypted and organizations were seriously disrupted as they fought to restore their systems – some were even reported to have paid ransom demands only to receive decryption keys from the attackers that didn’t fully work.
On an even greater scale was the infamous Solarwinds attack, where more than 18,000 of its customers installed a malicious malware update. Impacting organizations across the private and public sectors alike, hackers gained access to Solarwinds’s customer information systems, which were used as a stepping stone to broaden the reach of the attack.
This supply chain attack vector underlines the broad range of direct and indirect cybersecurity risks organizations currently face. Not only do they present a very real risk of serious breaches taking place, but they also erode the trust IT and cybersecurity teams have in the integrity of their highly integrated networks.
Trust sits at the heart of any rounded cybersecurity strategy
Building Confidence With CDR
The issue of cybersecurity trust is just as important across every other type of risk organizations face today, including mitigating file-based threats via email SMTP, web HTTP and file-sharing traffic. Helping organizations to trust every file is central to how Glasswall CDR (Content Disarm and Reconstruction) solutions enable our customers to operate normally even while file-based cybersecurity threats are increasing faster than ever.
In contrast, traditional reactive detection-based security solutions simply can’t keep up. For instance, approximately 1 in every 100,000 files contain malicious content, with 97% unknown to anti-virus solutions by the time it is removed by Glasswall. What’s more, it takes an average of 18 days for this malicious content to become known by anti-virus solutions after its removal by Glasswall. Meanwhile, sandboxing exposes organizations to risk from advanced malware and disrupts business productivity.
Glasswall’s approach proactively and instantaneously rebuilds files to a “known good” standard. Customers benefit from safe, clean files that have been rebuilt to the manufacturer’s published specification, removing any places for malware to hide. For customers, the impact is dramatic and helps to restore trust across every stakeholder that their files are free from malware threats irrespective of where they may be in the supply chain.
To learn more about how we help customers trust every file, click here.