Zero-Day Attacks: What they are and how to protect yourself graphic
September 4, 2018
By Heather Gwaltney

Reading recent tech articles, it’s hard to avoid the term “Zero-Day” threats.  It seems that catchy, yet threatening phrase is popping up frequently as if the average reader knows what it means.  In this article, we provide a definition of Zero-Day attacks, as well as, tips on how best to block them from your company.

What are Zero-Day threats?

Zero-Day threats or attacks refer to Internet attacks that are generally released before security developers can deploy a patch to protect against them.  They are previously unknown threats that become more widely known the same day they’re released.  The programs themselves target vulnerabilities in a company’s devices and apps, its operating system and the general commercial software it’s using. 

Watch Our Video On Cyber Security

Why these threats are pervasive now

While the practice of hacking companies continues to be profitable, hackers continue to look for new, creative ways to exploit them.  According to Wired Magazine, “…zero-days can sell for anywhere between $5,000 to half a million or more.”  Zero-Day attacks are becoming more pervasive as security companies attempt to get in front of hackers who literally make it their job to penetrate your network.  Attackers develop the malicious software to exploit common file types, compromise vulnerable systems and steal sensitive data, such as credit card and bank account information.

Industries most affected by cyber attacks

Cyber attacks primarily affect small and medium-sized business and enterprises, as well as, organizations with remote workers and/or branch offices, school campuses and other public institutions.  The #1 cyber-attacked industry is Healthcare.      

Best line of defense

Sandbox: Advanced Threat Protection (ATP) is one of the most powerful tools companies can use to protect themselves against Zero-Day attacks.  Sandbox ATP is a cloud-based service that companies can utilize as part of a customized firewall solution.  Suspicious files are detected and sent to the Sandbox ATP before they hit a company’s network, where they are inspected and analyzed.  The program analyzes suspicious code and a broad range of file types in a virtualized “sandbox” environment, where it runs the code as intended to monitor the behavior for malicious activity.  If, by running the code, a threat is identified, it will block the attack and deploy a remediation signature to all company firewalls – to prevent further attacks.  Lastly, the Sandbox ATP activity is fully transparent.  With the software, companies can access their own dashboard and reports, which detail the file analysis results, including source, destination and malware action.  Additionally, companies receive notification when suspicious files are sent to Sandbox ATP with the file’s verdict.

How Firewall Works

What else Sandbox ATP does for you

In addition to protecting your company against Zero-Day attacks, Sandbox ATP:

  • Is the best defense against Ransomware,
  • Captures hidden malicious code,
  • Detonates malicious code in Active content files, Passive content files and Malware in images, and
  • Improves signatures to detect future malicious code.

Learn more about the technology.

Additional ways to protect your company

Until security programs are able to protect companies 100%, it’s essential these days to follow the additional steps to safeguard your data:

  1. Invest in a fully configured firewall that is managed for you, so you get the protection you need and the firmware on the firewall router is updated for you.
  2. Ensure you have proper anti-virus, anti-malware software installed in each computer on your network.
  3. Be cautious and verify the source of unknown downloads, email attachments and hyperlinks.
  4. Update your Operating System every time an upgrade is made available to you.
  5. Only use essential apps on your system to reduce vulnerabilities.
  6. Back up your data daily in the cloud to eliminate single point of failure.
  7. Purchase cyber crime insurance, especially when data security is critical to your business’s mission and/or customer base.

GTB can help

GTB provides a free assessment of your company’s network security to identify whether it’s currently secure or vulnerable to threats.  If your company is vulnerable, we can design and implement a security solution that is customized to your company’s needs.  Once installed, GTB will continue to manage the system, so you don’t have to.  Managing your company’s Internet security includes:

  • Understanding your company’s security environment and ongoing needs.
  • Monitoring incoming and out going ports.
  • Monitoring threats coming through the company’s network.
  • Updating firewall firmware to protect your company against the most current threats.
  • Upgrading the latest security patches ongoing.
  • Keeping informed about the newest threats and protection methods.
  • Consulting you on services based on current threats and protection methods, as necessary.

Get Your Free Security Assessment Now

 

Related: How to Protect Your Company Against Cyber Attacks, Cyber Security: Traditional vs. Next Generation Firewall and When a Traditional Firewall Doesn’t Go Far Enough.