‘Five Eyes’ Alliance Updates Cybersecurity Advice as Risk to Critical Infrastructure Grows

by | Apr 27, 2022 | Cybersecurity news/commentary

The recent ‘Five Eyes’ intelligence agencies from the US, UK, Canada, Australia and New Zealand updated mitigation advice in response to Russian state-sponsored and criminal cyber threats.

Focusing on the risks faced by critical infrastructure providers, the advisory underlines the current heightened level of risk and aims to improve the resilience of organizations that could be targeted.

As Lindy Cameron, NCSC CEO, explained: “In this period of heightened cyber threat, it has never been more important to plan and invest in longer-lasting security measures. It is vital that all organizations accelerate plans to raise their overall cyber resilience, particularly those defending our most critical assets.”

The agencies advise that organizations of all sizes should focus on a range of mitigations against attacks that could be instigated by Russian state-sponsored operations and aligned cybercrime groups.

These include immediate actions such as:

  • prioritizing the patching of known exploited vulnerabilities
  • enforcing multi-factor authentication (MFA)
  • monitoring remote desktop protocol (RDP) and
  • providing end-user awareness and training

The Glasswall View

Cybersecurity alerts from the ‘five eyes’ intelligence agencies focus on the need to take proactive steps to prevent and mitigate the risks across organizations everywhere.

While most organizations understand the need to fend off malware and ransomware, the vast majority rely on a reactive response based on antivirus and sandboxing technologies to protect their valuable files and everything they contain. 

This is effective – but only up to a point. It’s this emphasis on reactive technologies where conventional anti-malware and file protection strategies lead to cybersecurity blindspots.

For instance, nearly 70% of malware found embedded within files is of an unknown variant when it is received, effectively making it invisible to reactive cybersecurity technologies. The problem is that it can take days or even weeks for antivirus and sandboxing solutions to be updated so they can protect files and documents. Glasswall’s own Threat Intelligence research has uncovered numerous examples of malware and ransomware sitting undetected on network infrastructure for anything up to 18 days before reactive solutions are able to respond.

Glasswall takes a proactive approach to file-based threats. Our Content Disarm and Reconstruction (CDR) technology offers a proven approach to defeating ransomware and malware by identifying and removing risky, zero-day file-based threats from all files in moments. This also minimizes downtime and disruption often caused by traditional anti-virus or sandboxing solutions. 

We intercept, scan and regenerate every file and document that comes in and out of your organization to a safe standard of “known good”. Organizations that are ‘Glasswalled’ are always ahead of bad actors, whereas antivirus solutions are always, at best, one step behind.

The process requires no blocking, no patching and with no false positives to hold back important business documents, meaning it delivers only safe, secure and trusted files. The result? Every file sent or received – via email or the cloud – can be treated with confidence by organizations fully protected from zero-day malware threats.

To read more about Glasswall CDR solutions, click here.

Related

What is Glasswall CDR?

Embedded Engine

CDR Platform

Solutions

REST APIs

Email Security

Threat Intelligence

Plug-ins

CDS Plug-in

ICAP Plug-in

Menlo Plug-in

Palo Alto Plug-in

apps

Apps

Clean Room

Desktop

Why CDR?

We believe people should be free to open their files without fear. Glasswall CDR takes a proactive approach to automatically remove all Zero-day threats from files, without sacrificing productivity.

Use Cases

Secure Email

File Uploads and Downloads

Malware Risk Removal

Metadata Removal

Cybersecurity Crisis Response

Cybersecurity Crisis Prevention

Cloud Native Integrations

Data Migrations

SDK Integration

Resource Library

Blog

Events

support lines

Support

Glasswall CDR Portfolio

Reactive cybersecurity is failing - it’s time for a better way. Traditional detection-based security methods play catch up with new threats. Find out how your organization can take a proactive approach to cybersecurity.

strategic alliances

About our Partner Program

Our Partners

Become a Partner

Bringing File-based threat protection to your customers

Offer a richer security portfolio with the most agile CDR platform on the market. Stand out from the competition with a partner program built for you. Let’s make files safer together.

About Glasswall

Our People

Careers

communication

Contact Us

support lines

Support

Raising the bar on file security

We believe people should be free to open their files without fear. To click on anything without risk of catastrophe. To use systems the way they were meant to be used. That’s why we’re raising the bar on file security at Glasswall.