Press Release Headlines

Up for Grabs: America’s Cybersecurity

Cyber surveillance is crucial for quick incident response times after security breaches

PORTLAND, Ore., May 30, 2013 /PRNewswire/ — Chinese hackers steal US trade secrets; organized cybercriminals empty bank accounts; government agencies, medical institutions and businesses are routinely breached. IPCopper, manufacturer of network security hardware, finds that, by and large, US businesses do not take cybersecurity seriously enough to innovate out of the complacent mindset that has allowed a multitude of vulnerabilities to form in US technology infrastructure and business systems. Not surprisingly, many lack the packet capture data necessary to figure out what happened when the inevitable breach occurs.

(Logo: http://photos.prnewswire.com/prnh/20130530/PH22886LOGO )

Cyber attacks unfold through sequences of bits and bytes that command the victim's computer to, for example, send out or delete data. One sequence may constitute computer commands for one computer / OS, while appearing as gibberish to another. Whether those commands are malicious is another question. Cybersecurity, by its nature, is reactionary, and much of today's network security equipment is predicated on catching already-known malware signatures – of little use against current threats, in the face of the infinite combinations of code possible. In an attempt to root out malicious communications, organizations with deeper pockets often use SIEMs to analyze netflow, which represents only a fraction of network data – much like guessing a letter's contents from the address label.

Accepted security practices remain rooted in the technology of the 90s, when networks were slower, the internet smaller and malware exotic. The cyber-threat landscape now, however, is scarier and more complex: breaches occur every day, malware is increasing exponentially and the old standbys (antivirus, firewalls, IDSs and IPSs) are failing to keep up. As last year's breach in South Carolina shows, at today's speeds attackers can steal 15 years of tax records for a whole state in hours.

In an environment where computer breaches are as sure as death and taxes, the cybersecurity winners are those who react the quickest. Given the high volumes of data on today's networks and the subtle and insidious ways that hackers get in and hide their tracks, quick incident response times are dependent on surveillance: recording and timestamping every packet, in every corner of the corporate network. Since surveillance is all about coverage, installing multiple packet capture appliances at key network locations is crucial.

Visit www.ipcopper.com to learn more.

About IPCopper: Headquartered in Portland, Oregon, IPCopper, Inc. designs and manufactures ready-made and custom solutions for cyber surveillance, network forensics and encrypted data storage. Always made in USA.

Contact:
Kathryn Ash
503-290-0110
Email