One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2145504
Date de publication 2021-01-05 11:00:00 (vue: 2021-01-05 11:06:08)
Titre Calm in the COVID storm: AT&T Cybersecurity
Texte We’ve been busy at AT&T Cybersecurity during the pandemic. Turns out we could help out our network customers in so many ways. Here are some examples: Helping enable remote learning Many schools closed their doors in Spring 2020, when COVID-19 cases began to spike within the U.S. and quickly transitioned to a distance learning model. While this move was necessary to protect the health of students and faculty, it left many low-income families in a position to figure out how they could connect their children to their school’s virtual classrooms when they had no internet service at home. AT&T worked with popular sports team, the San Antonio Spurs, to offer free and highly secure wireless internet to families from the AT&T Center parking lot. The Spurs managed the physical solution via Aruba Networks provided wireless access points, while AT&T provided the 1GbE internet circuit at no cost. And while access is critical to remote learning, it’s also important that students’ ability to participate in class isn’t hampered by issues that could cripple their device, such as malware. So, to protect students from threats that they may encounter online, AT&T Cybersecurity’s Global Security Gateway service was also deployed free of charge. Preserving business continuity Organizations are relying more than ever on their network connections to support their remote workers and to process e-commerce transactions. Bad actors have identified this dependence as a prime opportunity to strike and make some quick cash. Over the past couple of months, there have been global DDoS extortion campaigns that began with targeting businesses within financial services sectors but has since expanded to include many other industries. Victims of this campaign have received letters demanding payment of 20 Bitcoin on average (approximately US $227,000), to avoid large volume DDoS attacks. The AT&T Cybersecurity Threat Operations Center has been monitoring the network traffic 24x7 for customers that subscribe to the AT&T DDoS Defense service to identify and mitigate attacks but also assisting many non-subscribing customers with emergency mitigation services. In these instances, AT&T redirected the network of affected organizations to its scrubbing centers to block the malicious traffic, while letting legitimate transactions to flow unimpeded, allowing business to resume without paying these inflated ransom demands. Detecting threats before they impact your business One thing that hasn’t slowed down during this pandemic is cybercrime. Cybercriminals are taking advantage of the fear and uncertainty surrounding the current global health and economic situation as well as sudden shifts and exposures in IT environments to launch attack campaigns. The FBI recently reported that cyberattacks are up to around 4,000 incidents per day. With this increase in attacks, organizations need visibility and continuous monitoring of their entire environment to help detect and respond to threats before their business is impacted. The AT&T Managed Threat Detection and Response analyst team has been monitoring customer environments 24x7 for signs of potential threats and documenting investigations. For examples, checkout the blog series: Stories from the SOC. The team has been able
Envoyé Oui
Condensat $227  prevent 000 1gbe 2020 24x7 ability able accelerated access accounts across actors addressed advantage affected alien allowing also analyst antivirus antonio approximately are around aruba assisting at&t attack attacks attempts average avoid bad been before began behavior bitcoin block blog brute business businesses busy but calm campaign campaigns can capabilities cases cash center centers charge checkout children circuit class classrooms closed cloud commerce compromised connect connections consulting continuity continuous continuously correlation cost could couple covid cripple critical current customer customers customers’ cyberattacks cybercrime cybercriminals cybersecurity cybersecurity’s damage day ddos defense deliver demanding demands dependence deployed detect detecting detection device digital distance documenting doors down during economic elements emergency enable enabled encounter entire environment environments even ever example examples examples: expanded exposures extortion faculty families fbi fear fed figure financial flow force form free from gateway global had hampered has hasn’t have health healthcare help helped helping here highly holistic home how identified identify impact impacted important incidents include including income increase industries inflated information instances intelligence internet investigations isn’t issues it’s its keep key labs large launch leading learning left legitimate letters letting looking lot low make making malicious malware managed many may migrating mitigate mitigation model monitoring months more move mpls multiple necessary need network networking networks new non noticed now offer one online operations opportunity organizations other out over pandemic parking participate past paying payment per physical platform points popular position potential preserving prevent prime process progress protect provide provided public quick quickly ransom received recently redirected relying remote reported respond response resume rules safe san school’s schools scrubbing sectors secure security see sensitive series: service services shift shifts signs since situation slipped slowed soc software solution solutions some sooner spike sports spring spurs stay stories storm: strength strike students students’ subscribe subscribing such sudden support surrounding taking targeting team than these thing threat threats times traffic transactions transform transformation transitioned turns uncertainty unfamiliar unimpeded usm velocloud versus victims virtual visibility volume wan way ways we’ll we’ve well when wireless within without worked workers workforce your
Tags Malware Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: