make a good business better

Resource Center better insights

Print Divider Print Divider Branding
 

PODCAST: Attacker Dwell Time

08/22/2017  |  By: Bill Dean, CCE, GCIH, GCFA, GPEN, Senior Manager

Share

Social Logo Social Logo Social Logo Social Logo

Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel.

The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim is known as “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.

Listen in, and learn about these key takeaways:

  • Advanced attacks will often circumvent traditional static protections.
  • This provides the ability for extensive “dwell time” of attackers on your network.
  • Put in place additional network controls. If malware cannot communicate out, it cannot operate.
  • “Hunt” for previously undetected malware on your systems.

Subscribe to the Cybersecurity Sense Podcast on iTunes or listen to this podcast HERE.

To learn more about LBMC Information Security or to speak to one of our trusted professionals about our services, including how to prevent and protect against attacker dwell time, contact us today!