Users and their credentials are among the weakest links in an organization’s security infrastructure. As such, the majority of breaches involve credential theft at some point in the attack lifecycle. With credential abuse as part of the attackers’ toolset, their chances of successfully breaching go up, and their risk of getting caught goes down.
Why Should You Advocate and Test This Capability?
Preventing credential theft, such as often occurs via phishing attacks, reduces exposure to one of the most prevalent forms of targeted attacks on organizations. These measures are crucial when dealing with targeted phishing attacks, which typically go after non-technical employees through previously unknown phishing sites.
Move Beyond the Status Quo
Most organizations work to stop these attacks primarily through employee education, which is prone to human error by nature.
Technology products commonly rely on identifying known phishing sites and filtering email, but these methods are easily bypassed as checking for known bad sites will miss newly created ones, and attackers can evade mail filtering technology by sending a link through social. A next-generation firewall with machine learning-based analysis can accelerate protection. If the analysis identifies the site as malicious, your firewall should be updated and block it.
Still, there will always be new, never-before-seen phishing sites that are treated as “unknown.” To protect your network and users, it’s critical to prevent submission of credentials to unknown sites. By using credential filtering, organizations can whitelist authentication to authorized applications and block credential submission to unknown sites.
Recommended RFP Questions
Without risk, there’s rarely a reward, but not all risks are necessary. Take an important purchase like a new firewall. How can you know you’re making the right choice for your organization’s unique needs when so many vendors are essentially saying the same thing?
Actually, it’s simple and risk-free.
Traditional port- and protocol-based approaches simply can’t keep up with today’s more sophisticated and evasive attacks. Clearly, the time is right to move or upgrade to the most advanced next-generation firewall. As you prepare for this change, we’ll provide information on the technology itself, perspectives from peers who’ve made the transition, and ways you can lessen the learning curve for your teams. We’ll also show you how to test our next-generation firewall in your environment, and prove that it’s the right fit for your organization’s needs today and into the future.