{"id":1157,"date":"2024-11-05T23:03:36","date_gmt":"2024-11-06T06:03:36","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1157"},"modified":"2024-11-06T09:11:21","modified_gmt":"2024-11-06T16:11:21","slug":"defense-in-depth-and-the-continous-rise-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/05\/defense-in-depth-and-the-continous-rise-of-cyber-attacks\/","title":{"rendered":"Defense In Depth and the continuous rise of Cyber Attacks"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>There is a significant rise in Cyber attacks across the world, someone falls victim approximately every 11 secs and there is a 15% increase in Ransomware attack in North America in 2024. With this continuous rise in Cyberattacks it is no longer a matter of if but when you get attacked!<\/p>\n\n\n\n<p>One or two security measure or strategy is not enough to protect organisation\u2019s assets from being attacked, so this leads us to the question of What is Defense In-depth?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"551\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1.jpg\" alt=\"\" class=\"wp-image-1158 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1.jpg 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1-300x161.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1-768x413.jpg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/551;\" \/><figcaption class=\"wp-element-caption\">Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured<\/figcaption><\/figure>\n\n\n\n<p><strong>DEFENSE IN-DEPTH DEFINED.<\/strong><\/p>\n\n\n\n<p>According to NIST, defense in-depth is an information security strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization or the application of multiple countermeasures in a layered or stepwise manner to achieve security objectives. The methodology involves layering heterogeneous security technologies in the common attack vectors to ensure that attacks missed by one technology are caught by another.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"791\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-1024x791.png\" alt=\"\" class=\"wp-image-1159 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-1024x791.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-300x232.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-768x593.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-1536x1187.png 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-2048x1583.png 2048w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/USS-Defense-in-Depth-Graphic-v5-1568x1212.png 1568w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/791;\" \/><\/figure>\n\n\n\n<p>In order to have a robust security architecture, defense in-depth is must and this does not guarantee that your organisation would not experience cyber incident but it could reduce impact and all forms of cost associated with a cyber attack<\/p>\n\n\n\n<p>The cost associated to having a robust security architecture that defends and protects the networks and assets at multiple layers, cannot be compared to the loss that an organisation can experience from just a single breach as it costs way more when you experience a breach. For example;<\/p>\n\n\n\n<p><strong>LONDON DRUGS RANSOMWARE ATTACK<\/strong><\/p>\n\n\n\n<p>On April 28, 2024, London Drugs suffered a ransomware attack where cybercriminals stole sensitive data from its corporate head office. The attack led to the closure of all 79 stores across Western Canada until May 7 &#8211; more than a full week. The LockBit ransomware group was attributed with the attack that involved the exfiltration of files containing corporate information, including extensive internal records for London Drugs employees, immigration applications, sexual harassment complaints, and termination letters.<\/p>\n\n\n\n<p>The cyberattack on London Drugs resulted in a complete shutdown of its operations, encompassing both store fronts and online services, lasting just over a week. This closure significantly disrupted services and operations across multiple provinces, including British Columbia, Alberta, Saskatchewan, and Manitoba. Pharmacy staff reportedly posted themselves&nbsp;outside stores to fill vital prescriptions&nbsp;for customers, but the impact to business operations was widespread and severe.<\/p>\n\n\n\n<p>It remains undisclosed how London drugs was breached but certain proactive measures could have been taken to prevent this cyber incident.<\/p>\n\n\n\n<p>Firstly, implementing robust cybersecurity protocols and regularly updating all systems are essential in safeguarding against malicious attacks. Conducting regular security audits and&nbsp;penetration testing, both AI-powered with cybersecurity professional oversight, can help identify vulnerabilities that hackers may exploit.<\/p>\n\n\n\n<p>Additionally, investing in employee training programs to educate staff about phishing scams, social engineering and other common tactics used by cybercriminals can significantly reduce the risk of a breach. By employing multifactor authentication for accessing sensitive information can add an extra layer of protection to prevent unauthorized access. Having a strong incident response plan in place is also crucial so that immediate action can be taken in the event of a breach.<\/p>\n\n\n\n<p>Collaborating with cybersecurity experts and staying informed about the latest threats in the industry can help companies stay one step ahead of potential attackers. By prioritizing cybersecurity as a fundamental aspect of their operations, organizations like London Drugs can minimize the risk of falling victim to future cyberattacks.<\/p>\n\n\n\n<p><strong>CONCLUSION <\/strong><\/p>\n\n\n\n<p>In Conclusion, having a robust security defense in-depth strategy, does not guarantee your organization would not experience cyber attacks or incidents but it would help reduce negative impacts and losses and would help the organization build cyber-resilience in the face the rising Cyber attacks across the world.<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p><a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/defense_in_depth\">https:\/\/csrc.nist.gov\/glossary\/term\/defense_in_depth<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\">https:\/\/www.varonis.com\/blog\/cybersecurity-statistics<\/a><a href=\"https:\/\/globaledge2020.com\/the-london-drugs-cyberattack-2024\/\">https:\/\/globaledge2020.com\/the-london-drugs-cyberattack-2024\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.packetlabs.net\/posts\/london-drugs-gets-cracked-by-lockbit\/#:~:text=On%20April%2028%2C%202024%2C%20London,more%20than%20a%20full%20week.\">https:\/\/www.packetlabs.net\/posts\/london-drugs-gets-cracked-by-lockbit\/#:~:text=On%20April%2028%2C%202024%2C%20London,more%20than%20a%20full%20week.<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a significant rise in Cyber attacks across the world, someone falls victim approximately every 11 secs and there is a 15% increase in Ransomware attack in North America in 2024. With this continuous rise in Cyberattacks it is no longer a matter of if but when you get attacked! One or two security &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/05\/defense-in-depth-and-the-continous-rise-of-cyber-attacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Defense In Depth and the continuous rise of Cyber Attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":668,"featured_media":1158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1-600x400.jpg","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/11\/istockphoto-1420039900-1024x1024-1-600x551.jpg","author_info":{"display_name":"Ukamaka Udeaja","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/ukamaka-udeaja\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/668"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":4,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":1164,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1157\/revisions\/1164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/1158"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}