Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Cybersecurity Top 10 Cyberattack Vectors and Mitigation Tips: Part 1
Cybersecurity

Top 10 Cyberattack Vectors and Mitigation Tips: Part 1

By Nick Cavalancia
18 July, 2017

Recently, I wrote a series of three blogs covering the current state of security, external attacks, and attack behaviors all based on the Cisco® 2017 Annual Cybersecurity Report. While a very informative report, the definitive standard for information around data breaches is the Verizon® Annual Data Breach Investigations Report (affectionately referred to as the DBIR in the industry). If you haven’t added this report to your annual repertoire of reports to read, the DBIR (now in its 10th year) is the highlight of just about any cybercrime report you’ll get all year. 

What Is Verizon’s DBIR

DBIR cover.jpgWith this year’s reports utilizing data from over 42,000 incidents, nearly 2,000 confirmed breaches, from 65 contributing vendors and companies, the 2017 DBIR represents the most statistically relevant data around data breaches, trends, and cybersecurity. (For you statistics geeks, they cite a 95% confidence level with a margin of error of only 0.4% for incidents, and 1.4% for breaches.) 

Now that you know what the DBIR is all about, let’s look at some high-level trends using the top 10 attack classification patterns in descending order of occurrence. (This way, I’m covering them from the standpoint of most to least in frequency of attack methods.) As part of this, I’ll also give a brief overview of what to expect from each attack vector and provide direction on how to help mitigate the threat.

1. Denial of Service

Overwhelming an application, system, or network is one of the easiest ways for attackers to shut you down—even if only temporarily. And, while DDoS attacks themselves aren’t the means by which data is breached, a DDoS attack on, say, an email scanning appliance can cause malicious email to be rerouted directly into an organization, giving attackers an entry point. Proper responses include assessing externally facing assets and determining how an outage of those services would impact the company’s productivity, availability, and security.  

2. Insider and Privilege Misuse

hacker.jpgThis category includes any kind of unapproved or malicious use of organizational resources. It can be the result of both an actual insider (81% of the time), an external attacker utilizing compromised credentials (7% of the time), or a combination of both (8% of the time). With 82% of these incidents taking months or years to be detected, what’s needed is the detection of misuse. Knowing where sensitive data is, monitoring its access, and using analytics to determine when that access is abnormal all help to lessen the risk of this attack vector.

3. Crimeware

Of the 10 types of crimeware cited in the report, the overwhelming attack vector is ransomware. Representing nearly half the crimeware incidents, this is your biggest malware threat today. Proper responses include a robust malware strategy at the endpoint, at malware gateways, application whitelisting, and attachment sandboxing. 

4. Web Application Attacks

Most attacks of this type are done using botnets with the intent normally found to be defacing of sites and repurposing of systems (e.g. for malware command and control (C2) activity)—followed by more expected actions, such as stealing credentials, setting up phishing sites, and theft of personal information within application databases. Proper responses include limiting the storage of personal data or credentials on web application servers, as well as considering the use of two-factor authentication (2FA) that would require additional attack patterns different from those used to compromise a password.

5. Physical Theft and Loss

theft.jpgThis isn’t so much a malicious attack vector (as there are some cases of actual theft represented in the report), but more a careless user issue (as most incidents revolve around property loss). Leave your company laptop in the car only to be stolen or lose a USB drive on your way to work—both with company data on them—and there’s your data breach. Proper responses revolve around encrypting devices and data, strict policies around when, where, and how company data can be taken out of the organization’s network, and monitoring for data being transferred to external devices or via web email.

 

In my next blog, we’ll take a closer look at the remaining five attack classifications—Miscellaneous Errors, Everything Else, Cyber-Espionage, Point of Sale Intrusions, and Payment Card Skimmers.

 

Nick Cavalancia has over 20 years of enterprise IT experience and is an accomplished executive, consultant, trainer, speaker, and columnist. He has authored, co-authored and contributed to over a dozen books on Windows®, Active Directory®, Exchange™ and other Microsoft® technologies. Nick has also held executive positions at ScriptLogic®, SpectorSoft® and Netwrix® and now focuses on the evangelism of technology solutions.

Follow Nick on Twitter® at @nickcavalancia

 

Click here to find out more about the SolarWinds Layered Security offering and how it can help you secure your clients’ business.

 

© 2017 SolarWinds MSP UK Ltd. All rights reserved.

You might also like...
MSP Business

SolarWinds MSP Survey: Companies still failing on the security basics

Best Practices

Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity

MSP Business

How to keep on top of the malware threat

MSP Business

Is it possible to never experience an IT security breach?

MSP Business

The do's and don'ts of DIY pen testing

MSP Business

Cloud vs on-prem - Is your security better than a leading cloud provider?

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Best Practices (97)
  • Backup & Disaster Recovery (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.