Another day, another hack: fall out of the TalkTalk breach

Another day, another hack: fall out of the TalkTalk breach

Another day, another hack: fall out of the TalkTalk breachPaul German, VP EMEA, Certes Networks

Yet another breach has hit the hacking headlines, but are we surprised? Too many high-profile breaches have been under speculation so far this year, and businesses are still failing to put proper security measures in place to not only make the system more difficult to hack, but to limit the scope if a breach does occur.

Although the details of the TalkTalk breach are still unknown, one thing is for certain: TalkTalk must not have had a software-defined security strategy in place, focusing on users and applications rather than the network itself. How do we know this? If TalkTalk had cryptographically segmented its security system into predefined and clearly understood fragments, the breach would have been more manageable, instead of system wide.

The TalkTalk breach shows that assuming internal networks are safe and trusted is no longer acceptable. Hackers have turned trusted networks into playgrounds, moving laterally from system to system and liberally exfiltrating data. By compromising one user, even a contractor, hackers get past the firewall and enjoy access to essentially anything. When a no-trust security model is in place, it means that no network is trusted, inside or outside the perimeter, no user is fully trusted and equally, no device is trusted.

TalkTalk needs to take note: the most secure enterprises have adopted crypto-segmentation; meaning that they encrypt all sensitive application flows inside and outside the perimeter. To achieve this requires eliminating siloes and establishing a centralised method of creating and managing policies, and keying for end-to-end protection across all applications and networks. Building on the identity and access control technologies widely deployed, a cryptographic relationship creates a clean and unbreakable link between each user and the permitted data and applications, meaning that if a breach does occur, the hacker is limited with the information and data that it is able to exploit.

Crypto-segmentation combined with role-based access means authorised users can access applications encrypted from server to user. If a user is compromised, hackers can access only that user’s applications. Lateral movement to more sensitive applications is blocked, and the breach is therefore contained. This could have stopped the TalkTalk hackers in their tracks.

Architectures need to quickly adapt to the new world of user and application mobility by ensuring that network segmentation and application isolation can be applied across all environments, irrespective of network level control. User access control policies must be applied and enforced in real-time, across all users and applications both inside and outside the traditional firewalled perimeter.

The time for the industry to recognise that a fresh approach is needed is now. We must question how many more high-profile breaches like the one TalkTalk is currently dealing with are needed before clear and concise action is taken by the businesses most at risk.

[su_button url=”http://certesnetworks.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more on Certes Networks click here[/su_button]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

i-PRO

NHS Hospital Transforms with i-PRO Camera System

i-PRO announced that a teaching NHS hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras…
Gallagher Security

Gallagher Security empowers Channel Partners

Gallagher Security is proving its commitment to empowering its UK and European Channel Partners with the launch of its new Channel Partners..
Skills for Security

Skills for Security Partners with Videcon, EEN and Paxton

Skills for Security is proud to announce strategic partnerships with Videcon, Eagle Eye Networks, and Paxton Access Control…
Abloy UK

Abloy UK appoints new Digital Access Solutions Academy Manager

Carl Bridgwood has been appointed as the new Manager of Abloy UK’s Digital Access Solutions Academy, a purpose-built facility…
Skills for security

Skills for Security Announces Charity Partner for 2025

Skills for Security is proud to announce Footprints Conductive Education Centre as its official charity partner for 2025.

Skills for Security Celebrates Winners of the WorldSkills UK Finals

Skills for Security proudly celebrates the winners of the WorldSkills UK Finals in two categories…
Matt Humby website

Raising awareness on lithium-ion battery fires

Leading experts scheduled to present at Anticipate London, bringing together insights from the Safety and Health Expo, FIREX, Facilities Show and IFSEC.
BSIA

BSIA appoint new non-executive directors to Association Board

The British Security Industry Association (BSIA) has appointed Pauline Norstrom and Uzair Osman as new non-executive directors…
Scroll to Top