Cyber Security News

You Be The Hero. We've Got Your Back!

77% Of All Breaches Come Through Email

In a recent study I read that 77% of all breaches came through email, with all the sophisticated anti-virus programs out there one has to ask themselves why.

One of the reasons is that new or derivatives of malware and viruses come out every day, it is a virtual production line of malicious malware, being pushed out each and every day by cyber-criminals.

Why not, the total global impact of cyber-crime the last time I looked was up to US $3 Trillion US dollars, making it more profitable than the total global trade in marijuana, cocaine and heroin combined.

It is staggering.

The problem is as mentioned earlier, is new Malware/Virus releases happen every day, the majority of anti-virus programs or malware protection programs use historical data and are unable to protect your computer or network because they simply don’t recognize the malware.

They call this type of malware/virus “Zero-Day”, because it is new and unreported, leaving your network and or computer exposed.

So what’s the answer?

First of all forget all the big names in anti-virus that have branded their names and products into your mind, as the majority are using historical data, they simply cannot keep up, and with a number like 77% breaches through email we know how that is working out.

Now think outside the box.

The answer is pretty simplistic, do not rely on historical data only, why not detect the malicious code before it even gets into your system.

We spent a lot of time and research to find a partner that adhered to this thinking and partnered with a company called Solebit.

Solebit’s solution is a patent-pending DvC engine that distinguishes between code and data buried deep inside data files and streams. The engine locates hidden code that could be executed in any condition, by any type of processor.

This hidden code is often the first step in an attack, allowing the APT operators to gain a foothold in the target environment. Solebit’s engine does not require updates (such as signature updates), and works independently. It does not require connectivity to the Internet, other data repositories, etc.

This engine inspects every, data file, object or stream coming into the network. The engine searches for hidden code instructions, encrypted polymorphic payloads, shell codes and other buried commands in each and every stream.

Any type of unauthorized code that is detected is not allowed into the network, essentially creating a no code zone. These data stream are quarantined for analysis, then immediately alerts the networks IT personal with a report that details the infiltration attempts.

Essentially blocking and protecting your network from Zero-Day malicious viruses/malware.

Want to learn more about this cutting edge product, please feel free to contact me.

Top