NetWorks Group Blog

Security Threat Detection & Response for Healthcare Organizations

Posted by David Howard on Mar 20, 2018 11:36:51 AM

Why should Healthcare organizations should care about Managed Threat Detection & Response?

Read More

Topics: Managed Detection & Response, Healthcare

Effective Daily Log Monitoring for PCI

Posted by NetWorks Group on Feb 1, 2018 10:55:04 AM

Security technologies such as firewalls are meant, at best, to prevent data security breaches, or at worst, detect them before they get out of hand; but in some cases, organizations have been complacent. In the infamous Target data breach of 2013, hackers were roaming their system and stealing data for two weeks before the breach was even detected. In the equally egregious breach of Heartland Payment Systems five years earlier, hackers were stealing data for several weeks before the invasion was discovered. Ironically, both Heartland and Target were PCI-compliant, but the time lag between system compromise and detection was unnecessarily long. And, they’re not alone in this regard. 

Read More

Topics: Security Monitoring, Managed Detection & Response, Compliance, PCI

NetWorks Group is listed as one of the “Key Innovators” in MarketsandMarkets’ Managed Detection and Response Market – Global Forecast to 2022 Report.

Posted by Jyothish Varma on Jan 8, 2018 3:00:31 PM

NetWorks Group is listed as a key innovator in the MarketsandMarkets’ Managed Detection and Response Market – Global Forecast to 2022 Report (Section 11.13.3 under Company Profiles (Page No. - 76)). This research report categorizes Managed Detection and Response Market by Security Type (Endpoint, Network, Application, Cloud), Deployment (On-Premises, Hosted), Organization Size (SMEs, and Large Enterprises), Industry Vertical, and Region. According to MarketsandMarkets, the Managed Detection and Response (MDR) market size is expected to grow from USD 335.5 Million in 2016 to USD 1,658.0 Million by 2022, at a Compound Annual Growth Rate (CAGR) of 31.6% during the forecast period. The base year considered for the study is 2016 and the forecast period is from 2017 to 2022.

Read More

Topics: Managed Detection & Response

Understanding OCR Guidance on Ransomware

Posted by Jyothish Varma on Dec 27, 2017 10:11:00 AM

Understanding OCR Guidance on Ransomware

With the prevalence of data breaches, ransomware has also come to the forefront of security threats. This malicious software is created by hackers who encrypt data and hold it hostage. Users are denied access to this data until they pay a ransom to the hacker.

Read More

Topics: Managed Detection & Response, Information Security, Threat Management, Healthcare, HIPAA

Modeling an effective threat detection and response program

Posted by NetWorks Group on Dec 19, 2017 10:35:41 AM

Modeling an effective threat detection and response program

Know Your Enemy

Read More

Topics: Managed Detection & Response, Information Security, Threat Hunting, Threat Management

The Impact of Cybersecurity Breaches in the Healthcare Industry

Posted by Jyothish Varma on Dec 14, 2017 10:16:05 AM

Cybersecurity breaches reached unprecedented levels in 2017. Few were spared as businesses and government entities alike -- including Equifax, the British National Health Service and even the U.S. National Security Agency, as well as dozens of others -- were hit with data breaches. While frequent targets like the financial sector and retail industries experienced their fair share of attacks, the healthcare sector is now the primary target of hackers, accounting for 25 percent of all data breaches. Understanding why this is happening and the consequences of it will help you improve your company's cybersecurity defenses and mitigate future threats.

Read More

Topics: Managed Detection & Response, Information Security, Threat Management, Healthcare, HIPAA

Protect. Detect. Respond: The Case for Managed Detection and Response

Posted by NetWorks Group on Nov 27, 2017 10:49:18 AM

Cyber security is on the mind of every business executive in the world. Modern security challenges are not easy to fix or even identify, and despite some misleading advertising from vendors, there is no one-size-fits-all solution. We frequently observe large visibility gaps in existing security implementations, providing even obvious red flags to slip under the radar. Firewalls and traditional antivirus software are important, but only react to known threats. Too many organizations rely on passive preventative technology for network security. Good attackers employ stealth and polymorphic tools that defy signature-based detection, allowing them to bypass these technologies all together. We must assume that threats will get in, and no system is impenetrable.  

Read More

Topics: Security Monitoring, Managed Detection & Response, Information Security, Threat Hunting, Threat Management

Honeypots: Is This Thing On?

Posted by Nick Brigmon on Oct 30, 2017 10:19:48 AM

Honeypots once were a dying technology. In the age of generic anti-virus, a device that did not show immediate results wasn’t well received by most I.T. that had trouble understanding the security benefits behind the stealthy device. The truth of the matter is these honeypots are one of the most powerful internal detection mechanisms a network can have. A fully configured honeypot can help detect and stop a full blown internal attack.

Read More

Topics: Managed Detection & Response, Ethical Hacking, Threat Hunting, Threat Management

Threat Detection - Logs, Log Sources and Analysis Make All the Difference

Posted by Matt Warner on Oct 10, 2017 9:25:00 AM

Threat detection has grown to a complex and messy activity in organizations. Many utilize Security Information and Event Management systems which can play a critical role in today's enterprise.  In order to do their job, SIEMs depend on the logs generated by the enterprise's various systems. Sounds simple enough. However, in a typical Fortune 500 company scenario, an astounding amount of log data is generated. It's not at all unusual to see 10 Terabytes of plain text per month. Fact is, there can be hundreds, even thousands of sources of log data in the typical enterprise. Even small and medium sized businesses will be overwhelmed trying to collect, analyze, and store their log data. The questions are, then, “Can you collect AND analyze them all? Should you? Will the the infrastructure support storage and ongoing detection? Do you have the expertise in place to analyze logs and maintain the infrastructure to do so?”  

Read More

Topics: Security Monitoring, Managed Detection & Response, Information Security, Threat Hunting, Threat Management

Equifax breach: A learning opportunity to get ahead of the constant threats

Posted by Amanda Berlin on Sep 8, 2017 12:10:43 PM

If you haven’t heard already, Equifax one of the “big-three” U.S. credit bureaus has announced a data breach that may have affected 143 million Americans, including consumer Social Security numbers, birth dates, addresses and some driver’s license numbers. For a good rundown of what has transpired so far, Krebs on Security has a solid in-depth article on it here. Every time there is a breach in the news, most other outlets swarm to a few different types of articles. Some popular directions are attribution, defense advice, or sensationalist journalism.

Read More

Topics: Managed Detection & Response, Ethical Hacking, Information Security, Threat Advisory

Subscribe to our blog!