Emulate and stay safe, says Cobham Wireless

Emulating attacks can highlight weaknesses, allowing to fix any problems in advance
Robert Winters, director of communications security at Cobham Wireless
Robert Winters, director of communications security at Cobham Wireless


Emulating attacks can highlight weaknesses, allowing organisations to fix any problems in advance, says Robert Winters, director of communications security at Cobham Wireless

CommsMEA: Are telcos more susceptible to ransomware attacks compared to other industry sectors?

Telcos are not necessarily more susceptible. However, as telcos offer managed security services, they do have to ensure end-to-end security for the safe delivery of video, voice and data applications and services. Whilst ransomware is receiving a great deal of publicity at present, telcos are in fact subject to a constant flow of other threats. These come from malware or denial of service attacks, with hundreds of new certified vulnerabilities uncovered every month, and increasing with the influx of mobile devices being connected to the network.

CommsMEA: Which areas of telco operations are the most at risk?

Due to the end-to-end nature of service delivery, there are, unfortunately, multiple interfaces at risk of attack when connecting a mobile user or ensuring seamless transport through the mobile core and internet.

CommsMEA: What should telcos do to make sure their critical data isn’t affected by ransomware?

The most critical data functions related to network service operations will already be protected and not exposed to the same vulnerabilities as most victims of ransomware. So sources of infection such as email, browsing, pop-ups, file sharing, USBs and the ability to worm into other users’ networks would not be present. Very strict user access control would also be in place with heavy usage of firewall/IPS/IDS systems.

CommsMEA: How does Cobham Wireless help in  strengthening security of telcos?

Cobham Wireless encourages regular vulnerability assessments. Our TeraVM product line emulates thousands of attacks, including ransomware. Attack profiles are updated every couple of weeks to our cybersecurity attack database; each unique threat within this database is a proven exploit to violate an application or service. Emulating attacks can highlight weaknesses, allowing our customers to fix any problems in advance.

It’s also extremely important to validate security infrastructure in both normal modes of operation, as well as when dealing with attacks. Adding security like corporate VPNs inevitably adds processing overhead. Therefore, maintaining end user quality of experience even in normal operating conditions, is critical. The level of overhead that is assigned to dealing with an attack is an important KPI when considering new or upgraded cybersecurity systems.

The recent WannaCry attack was preventable if the practices had been in place. Firewalls could have blocked the encrypted malware from being installed, and prevented its spread by detecting counterfeit DNS lookups to the internet, as well as the vulnerability in the networks. The fact that this exploit was allegedly stolen from government databases shows that a holistic approach to security is required.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story