Accessibility Statement Skip Navigation
  • Resources
  • Blog
  • Journalists
  • +44 (0)20 7454 5110
  • Client Login
  • Send a Release
Return to PR Newswire homepage
  • News
  • Products
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All Public Company News
      • All Multimedia News
      • View All News Releases

      • Regulatory News

      • D/A/CH Regulatory News
      • UK Regulatory News
      • View All Regulatory News

  • Business & Money
      • Auto & Transportation

      • Aerospace & Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads & Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking & Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film & Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers & Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalisation
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls & Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil & Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defence
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation & Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking & Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers & Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines & Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics & Personal Care
      • Fashion
      • Food & Beverages
      • Furniture & Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewellery
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film & Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks & Tourist Attractions
      • Gambling & Casinos
      • Hotels & Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Animal Welfare
      • Corporate Social Responsibility
      • Economic News, Trends & Analysis
      • Education
      • Environmental
      • European Government
      • Labour & Union
      • Natural Disasters
      • Not For Profit
      • Public Safety
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Overview
  • Distribution
  • Paid Placement
  • Multichannel Amplification
  • Disclosure Services
  • SocialBoost
  • Rooms
    • MediaRoom
    • ESG Rooms
  • AI Tools
  • General Enquiries
  • Media Enquiries
  • Partnerships
  • Hamburger menu
  • Cision PR Newswire UK provides press release distribution, targeting, monitoring, and marketing services
  • Send a Release
    • Phone

    • +44 (0)20 7454 5110 from 8 AM - 5:30 PM GMT

    • ALL CONTACT INFO
    • Contact Us

      +44 (0)20 7454 5110
      from 8 AM - 5:30 PM GMT

  • Client Login
  • Send a Release
  • Resources
  • Blog
  • Journalists
  • News in Focus
    • Browse News Releases
    • Regulatory News
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
    • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Client Login
  • Send a Release
  • Resources
  • Blog
  • Journalists
  • Overview
  • Distribution
  • Paid Placement
  • Multichannel Amplification
  • Disclosure Services
  • Cision Communications Cloud®
  • AI Tools
  • Client Login
  • Send a Release
  • Resources
  • Blog
  • Journalists
  • General Enquiries
  • Media Enquiries
  • Partnerships
  • Client Login
  • Send a Release
  • Resources
  • Blog
  • Journalists

WatchGuard Technologies Urges Action, Not Panic for IT Professionals in Face of Sony Attack

This image opens in the lightbox

News provided by

WatchGuard Technologies, Inc.

22 Dec, 2014, 20:39 GMT

Share this article

Share toX

Share this article

Share toX

- WatchGuard's Global Director of Security Strategy predicted a "Hollywood"-worthy infrastructure attack a year prior to hack

- Five actions to strengthen your first-line defense and seven actions to minimize damage if cyber criminals do get in

SEATTLE, Dec. 22, 2014 /PRNewswire/ -- WatchGuard Technologies, a worldwide leader in multi-function firewalls, urges IT professionals worldwide to use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks.

Logo - http://photos.prnewswire.com/prnh/20140224/SF69246LOGO

"A year ago, we predicted major state-sponsored attacks may bring a Hollywood movie hack to life that exploits a flaw against critical infrastructure – we just didn't predict it would happen to Hollywood itself," said WatchGuard's Global Director of Security Strategy, Corey Nachreiner. "It's important that IT pros use this opportunity to upgrade what is often five-year-old technology to defend against five-day-old threats."

"The FBI is right when they said that less than 10 percent of companies could survive an attack like the one on Sony," continued Nachreiner. "And, unfortunately, it's not a question of if, but when for these kinds of attacks."

Nachreiner recommends five immediate actions companies can take to make sure they have the best possible chance of preventing attacks, and seven actions to minimize damage if cyber criminals do get in.

Five Actions to Strengthen Your First-Line Defense

  1. Firewalls and antivirus (AV) are not enough (Defense in Depth): The threat landscape has changed greatly in the last five years, and firewalls and AV are simply no longer adequate as standalone protection against advanced attacks. Today, organizations need many layers of defense to truly protect themselves from evasive threats, including intrusion prevention services, web security solutions, reputation services, application control and more.
  2. Don't just lock down incoming traffic; restrict outgoing (egress filter): ­Most security professionals focus on restricting outside (Internet-based) traffic from getting into their network. However, administrators should spend time restricting the outgoing traffic as well. If you limit what your users can do online to what's absolutely necessary for business, you can often prevent employees from accidentally stumbling on cyber landmines, and you might even prevent malicious software from calling home to its attacker.
  3. Today, you need Advanced Persistent Threat (APT) protection: Advanced threat actors have become extremely sophisticated and regularly create evasive malware designed to get past signature-based AV solutions. This means someone has to find the malware before you have a signature to protect against it. APT solutions detonate potential malware and use behaviors to immediately identify previously unknown, zero-day malware. If you rely only on AV protection, consider yourself infected.
  4. Train employees to identify and report spear phishing attempts: Spear phishing is one of the most common advanced attack techniques. Rather than sending an obviously suspicious email, sophisticated actors study their victims intimately and send very targeted and much more believable emails. Train employees on the existence of spear phishing and warn them to remain suspicious of any email with a link or document attachment, even if it seems to come from a co-worker.
  5. Use reputation-based security services and threat intelligence: Today, malware delivery is very dynamic and moves at the speed of light. Security organizations have launched information-sharing reputation services to give security controls up-to-the-minute information on what might be a bad site. Make sure your security arsenal includes controls that leverage reputation services.

Seven Actions to Minimize Damage if Cyber Criminals Do Get In

  1. You will get breached; plan for it: No matter how sophisticated your security, nothing is perfect. One day you will be breached, so you need to design your internal network with this inevitability in mind. Back up your data, have a pre-written disaster recovery plan, and ensure systems are in place so operations can continue even if the worst happens.
  2. Encrypt, encrypt, encrypt: Modern companies have become very good at encrypting any data that leaves the corporate network, but far rarer is anything encrypted locally. If you store any sensitive data (e.g., password databases), it must be encrypted on the computer it's sitting on. If you encrypt stored local data, it becomes much harder for attackers to steal it – even if they do breach your network. There is no excuse for not using local disk or file encryption.
  3. Segment your network and apply "least privilege" principles: Your internal employees shouldn't have equal access to all of your data. A marketing person should not have access to your full corporate finances, and an accountant should not have access to the marketing plan for a yet-to-be-released movie. Segment your trusted network using strong security controls to limit internal employee access. Also be sure to leverage the least privilege principle to ensure employees have access to only what's needed to perform their job roles.
  4. Two-factor authentication: Passwords will not die anytime soon, however, if you rely on passwords alone and someone figures out your administrator's credentials, your network is lost. If you use some form of two-factor authentication, an attacker will not be able to compromise your network even if an important password is leaked. In 2015 and beyond, two-factor authentication will become a must have – not just a "nice to have."
  5. Data loss prevention (DLP) can stop data exfiltration and alert you to problems: Modern security products now have controls that recognize when specific data moves around your network. Using DLP controls can help prevent bad guys from sending data out over the Internet, or may at least alert you when data is leaving your building.
  6. Consider the full kill chain and block outgoing command and control (C&C) connections: The kill chain consists of every step in the attack process, including post-breach steps like the communication channels malware uses to report back to attackers for data exfiltration. Even if you get breached, it's NOT too late to prevent the attack from continuing. Many modern security products can detect and block malware's outgoing communications. This may prevent attackers from gaining access to your network even if malware has already infiltrated your organization.
  7. Visibility and analytic solutions can recognize when you're breached: Organizations are not noticing that their network has been compromised until it's much too late, largely because legacy network and security controls do not do a good job of identifying very important events in the oceans of data stored in log files. Today, you need security visibility and analytic controls that can translate and correlate that ocean of logs and present you with the key events that identify that something went wrong.

Visit the WatchGuard Technologies website and Security Center blog to learn more about critical cyber security best practices.

About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuardTech on Facebook, or on the LinkedIn Company page.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Contacts:
Kerry Desberg
WatchGuard Technologies
425-231-9529
kerry.desberg@watchguard.com

Justin Hall
Voxus PR
253-444-5442
jhall@voxuspr.com

Related Links

http://www.watchguard.com

Modal title

Contact PR Newswire

  • +44 (0)20 7454 5110
    from 8 AM - 5:30 PM GMT
  • General Enquiries
  • Media Enquiries
  • Partnerships

Products

  • Content Distribution
  • Multimedia Services
  • Disclosure Services
  • Cision Communications Cloud®

About

  • About PR Newswire
  • About Cision
  • Partnering Opportunities
  • Careers
  • Accessibility Statement
  • APAC
  • APAC - Simplified Chinese
  • APAC - Traditional Chinese
  • Brazil
  • Canada
  • Czech
  • Denmark
  • Finland
  • France
  • Germany
  • India
  • Indonesia
  • Israel
  • Japan
  • Korea
  • Mexico
  • Middle East
  • Middle East - Arabic
  • Netherlands
  • Norway
  • Poland
  • Portugal
  • Russia
  • Slovakia
  • Spain
  • Sweden
  • United States
  • Vietnam

My Services

  • All News Releases
  • Customer Portal
  • Resources
  • Blog
  • Journalists
  • Data Privacy

Do not sell or share my personal information:

  • Submit via Privacy@cision.com 
  • Call Privacy toll-free: 877-297-8921

Contact PR Newswire

Products

About

My Services
  • All News Releases
  • Customer Portal
  • Resources
  • Blog
  • Journalists
+44 (0)20 7454 5110
from 8 AM - 5:30 PM GMT
  • Terms of Use
  • Privacy Policy
  • Information Security Policy
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 PR Newswire Europe Limited. All Rights Reserved. A Cision company.