<img height="1" width="1" src="https://www.facebook.com/tr?id=109783749644748&amp;ev=PageView &amp;noscript=1">

Don't Get Uber-ed: Security Threat Monitoring for the Rest of Us

Donna Mills

Donna Mills About The Author

Nov 27

Last week, ride-sharing company Uber became the latest high profile corporation to disclose that they were victims of a massive hacking. They're now part of an embarrassing list of name brand companies like HBO, Yahoo, and Experian who were victims of breaches this year.

SIEM and SOC as a Service

But there is some reason for optimism: According to the latest annual survey of IT professionals by CSO, business investment in cybersecurity tools is paying off. The number of security events reported by respondents declined 8.2% from 2016.

However: The severity of these events has gotten worse. Phishing, ransomware, and financial fraud have all increased - with a "sharp decline in the number of businesses that experienced no losses."

On top of that, the survey reports that threats have become more difficult to detect, with the average time to intrusion discovery increasing from 57 days in a couple of years ago to 92 days in 2017.

And the longer a breach lasts, the more costly mischief the perpetrators may make, even if the criminals don't demand payment. The $100,000 Uber ill-advisedly paid its hackers to destroy stolen data is just the beginning. Uber's security team violated the law by neglecting to inform its customers of the breach, and there will be legal consequences in all the regions where they do business. On top of that, they can expect a number of lawsuits from the 57 million riders and drivers whose information was possibly exposed by the hack.

Many small-to-medium enterprises simply cannot afford the potential cost an attack could have. In certain unfortunate situations, some of these organizations have to permanently close their doors following an attack or breach. Moreover, it if is found that the organization did not adhere to regulatory legislation, the cost can rise drastically due to legal costs.

Fully managed security threat monitoring as a service.

We offer our clients a turnkey 24/7 Security Operations Center that can be deployed in about an hour: with highly skilled security analysts and engineers, Forensics and Incident Response Teams, and a Security Information & Event Management (SIEM) product. Our experienced engineers take care of the implementation and SIEM management, fine tune the correlation rules and alerts, validate the findings through our own Security Incident Response team, and assist in remediation.

The Datalink Networks SIEM/SOC service includes:

  • 24/7 security operations center, SOC-as-a-service
  • Cloud based security information & event management (SIEM). as a service.
  • Incdient Response Team (IRT) and Forensics IRT-as-a-service
  • Monitor threats on-premise, Cloud (e.g. AWS, Azure) or hybrid
  • 10 minutes SLA response time

Our agentless cloud based SIEM solution supports over 250 products (i.e., firewalls, domain controllers), as well as Office 365 security monitoring and takes just one hour to implement.

Best of all: You can try out the service for 30 days free with no opt-out penalty. After that, you pay just one low monthly subscription fee per device.

 Find Out More - Download the Fact Sheet.

 Download Now

 

 

2018-8-Security-Scan-CTA

Network Security Assessments

Do you know what's lurking in your network? Datalink Networks LAN vulnerability scans are the key to rooting out threats and developing a security plan to keep them out. Our assessment includes:

  • Scans in front and behind the network firewall
  • Active Directory Vulnerability Scan
  • Network Design/Topology Review
Learn More