What makes CyberInt unique?

The CyberInt is focused on protecting businesses “beyond the perimeter”, detecting anything that can damage an organization from outside of the corporate firewall. While most solutions deal with network based detection and prevention, we take a proactive approach and look beyond the perimeter, taking the attacker’s perspective. We developed a platform that combines a few models to provide real time threat intelligence. Our system is designed to locate early indications and protect online assets such as websites and social media accounts. We also provide an analysis of security risks that could be derived from a third party that a company is dealing with. We scan the online footprint and surface of potential partners to assess their level of risk, and capsulate all the information into cyber simulations from the outside in.

Who can use CyberInt ? Does it take an IT person? Can I use it from my home office?

Our solution is not geared for individuals but for enterprises. We normally deal with either the IT/IS team or the marketing department, for the simple reason that brand protection has a lot to do with the marketing and business side of things rather than merely the IT environment. For the larger corporations, brand protection is the name of the game. Take the TalkTalk group for example; A few months ago, they were attacked and lost valuable data. That’s a huge damage to the TalkTalk’s brand, which could have been prevented should they have used a service like ours. With our early detection mechanism, we would have been able to prevent the whole incident, for example, by alerting them on potential phishing campaigns on social media and the dark web.

What does it take to deploy CyberInt ?

CyberInt  is a cloud based solution which is easy to implement. It doesn’t require any on premise installations or hardware devices. We provide our service in a few manners:

What are the most common threats you find “outside the perimeter”?

Most common threats are leaked credentials like passwords and emails, done by phishing campaigns and phishing websites that ask for login credentials and credit card numbers. Targeted attacks on social media are also a growing trend, whereby attackers try to phish or plant malware using twitter or Instagram. We also see kits that threat actors are using to ingest malware to steal cash or break into a user’s private accounts. Social media attacks usually begin with defacements, bad mouthing and negative campaigns which target a certain company, inviting people to join the cause and share info. Threat actors continue to the next step by embedding a look-alike account or community page, trying to get customer data, login credentials, and whatever else they can lay their hands on. There’s also a disturbing rise in malicious malware being planted in comments, with titles like “Press here to get a discount”, and then downloading malware into the user’s device.

Which industries are mostly prone to attacks?

Generally speaking, the larger your online footprint, the more prone you are to attacks. Vulnerable industries are of course, online retail, who deal a lot with customer data, and banks, which have always been a lucrative target for theft, long before cyber-crime arose. Another target is telecom companies, who also hold a great deal of customer data.

What best practices would you recommend for securing a brand online?

First and foremost, you need to be intelligence led; instead of gathering security efforts all over, focus on the hot spots which are the most sensitive. Good and solid intelligence tools that provide early detection can keep you out of trouble, so you can defend the organization where threats are imminent. Don’t wait for threats to hit you; go beyond the perimeter and guard your online assets, as they are the most vulnerable to attacks. On the other hand, a quick response is also extremely important. Make sure the team is aware and alert to react quickly when threats are detected by raising awareness in the organization. Cyber security is super exciting; the growing linkage between security and brand protection makes it critical to deal with threats from the business side of things and not just from the IT perspective. Companies like us help protect organizations by making sure they manage attacks in the most efficient manner, preserving their good name while fighting to defend their data.

Why Intelligence is the Key to Securing Your Brand - 41