Hacking is a 24-hour business

9-5 attention no longer cuts it

Hackers don’t care for 'office hours'. Day and night, cybercriminals are ‘casing for data’. In fact, ‘out of hours’ is often the favoured time.

This 'out of hours' sweet spot means organisations must have their guard up at all times, or risk suffering the consequences. Large enterprises do this by employing huge teams of people. For mid-sized businesses, a lack of resources to mount a 24/7 defence leaves them at an increased risk of a cyberattack. The knock-on effect of this can cause devastating financial and reputational damage.

Yet turning to automated, legacy security is proving to be inefficient. It does offer ‘cruise control’ protection, but cruise control isn't smart enough to halt modern attacks.

49% of attacks take place on a weeknight and 29% over the weekend

This situation is serious – but it is also manageable. The rise of autonomous cybersecurity offers mid-market businesses access to 24/7 security, designed to cope with an ever-changing threat landscape.

Late Night Callers

Three in four ransomware attacks targeting the enterprise sector take place at night, with 49%  occurring on a weeknight and 27% over the weekend, according to FireEye. This is a serious problem for resource-challenged (or non-existent) mid-market security teams, looking to better protect their organisation from infection.

If an incident takes place late on Friday night and is only noticed at 9am on Monday morning, hackers will have spent the entire weekend extending their attack or even covering their tracks. It allows them to spend longer inside the network and cause more damage longer-term.

The most obvious response to a 24/7 threat is to have a Security Operations Center (SOC) operating day and night. For mid-market businesses, this is unfeasibly expensive. Automated security products offer a partial solution, but often fail to identify and detect unknown threats. The ability to respond to the unknown is a key part of a proactive security posture.

“Most automated network and endpoint security controls utilise signature and rule-based alerting for IOCs, which only detect the “known knowns”. This catches previously described malware hashes,” the Home Office’s Digital, Data and Technology team warned in a paper called ‘Detecting The Unknown’.

Zeroing in on Threats

The risk posed by zero-day threats is also growing, with Google’s Project Zero recently warning of a significant “uptick” in these unknown vulnerabilities in 2021. “Halfway into 2021, there were 33 zero-day exploits used in attacks that went on to be publicly disclosed — 11 more than the total number from 2020,” it wrote in July.

Without full-time staff or access to 24/7 support, mid-size businesses are vulnerable when new threats and zero-days emerge. The solution is to enable cyber security defences to act autonomously. Automated systems work like an autopilot, stopping expected attacks and responding effectively to threats that have been encountered before. But they can’t cope with the unexpected.

Autonomous cybersecurity, on the other hand, can react independently to identify and stop threats that have never been encountered before. Mobilising autonomous security is like adding a superhuman new member to your team that can work around the clock without stopping.

Autonomously Augment

Autonomous security also augments the abilities of IT teams by saving from the time-consuming process of painstakingly investigating minor alerts or false positives. In an interview with the government tech publication MeriTalk, Dr Matt McFadden, Vice President of Cyber at the defence giant General Dynamics, said that autonomy offers organisations the ability to cope with threats that are “constantly changing, increasing, and growing more sophisticated”.

We need our cyber defenders to maximise their time to focus on the high priority impacts, rather than on the trivial ones they’re bogged down with,” he continued. “Autonomous cyber defences can help solve those challenges – resulting in enhanced perimeter protection, improved endpoint and continuous monitoring, automated patch management, and enriched cyber situational awareness.”

Mid-market organisations no longer need to do without 24/7 support. Autonomous security systems offer mid-market organisations powerful, cost-effective solutions that never sleep and are intelligent enough to cope with threats that are known and unknown. Autonomy is undoubtedly the future of security.

For more information about this topic please request a callback or book some time in our calendar

Related Articles
Cloud Security Top trends in cybersecurity 2022: Vendor consolidation
Cloud Security Empowering the people
Empowering the people

Critical cyber security challenges.

Cloud Security Will the mid-market be left behind the cyber security curve?
Cloud Security Data in the cloud heightens the insider threat
Data in the cloud heightens the insider threat

The insider threat that caused the security vs usability conundrum.

Cloud Security Lighten your cybersecurity load
Lighten your cybersecurity load

How a consolidated approach works.

Cloud Security Platform perspective for the mid-market
Platform perspective for the mid-market

Key insights and recommendations from Gartner.

Cyber Security Why security portfolios will fail as platforms prevail
Managed Security Services Technology leaders' guide to SASE
Technology leaders' guide to SASE

The what, why and how of SASE

Cyber Security Red alert for cybersecurity
Red alert for cybersecurity

5 steps for defence

Cyber Security Cyber Security ABCDs
Cyber Security ABCDs

What they are and how to get them right

Cyber Security 7 cybersecurity challenges facing financial institutions
Managed Security Services Protecting the mid-market against ransomware
Protecting the mid-market against ransomware

"The biggest cyber threat facing the UK"

[Video] Plan smart: The future is SASE
[Video] Plan smart: The future is SASE

The perimeter is no longer “entombed in a box”

Cloud Security Censornet Platform Data Sheet
Censornet Platform Data Sheet

Freedom. Visibility. Protection.

Cloud Security Slam the door shut on cyber attacks
Slam the door shut on cyber attacks

with this all-in-one solution

⚠️ The UK Mid-Market on Code Red
⚠️ The UK Mid-Market on Code Red

The state of the UK’s cyber security response

Cloud Security Ten steps to prepare for SASE adoption
eBook
eBook

Zero Trust and Beyond

Cloud Security Webcast: Human Security and Risk Management
Webcast: Human Security and Risk Management

How to protect your users with email security

Uncovering 0365’s Security Blind Spots
The Impact of Remote Working
Zero Trust, Maximum Security
Cloud Security Russia Arrests 14 members of Top Ransomware Gang in the World
Cloud Security CISOs:  Top 5 Concerns in 2022
Cloud Security Ukraine’s Digital Minister forms Social Media Army
Cloud Security Autonomous Cyber Security
Autonomous Cyber Security

Easing alert fatigue

Cloud Security Fortify the New Perimeter
Fortify the New Perimeter

Protect your data in the cloud

Cloud Security The Dangers of Ignoring Cyber Security Needs
Cloud Security Data in the Cloud
Data in the Cloud

And the heightened insider threat

Cloud Security Is Cyber Security Complexity
Is Cyber Security Complexity

Threatening your business?

Cloud Security Mid-Market's future
Mid-Market's future

If it's left behind the cybersecurity curve

Cloud Security Fortifying the New Perimeter
Fortifying the New Perimeter

Protect your data in the cloud

Share this story

User Rating

Find out more about how to defend data while you sleep

Rate the Article

Click the link below to rate this article

Rate this article

Here’s a single security platform that seems to provide all you need to protect your business from cyber attack and, refreshingly, they don’t put it all down to AI.

Learn More

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch