pointer

JP Morgan Breach Latest Indication of Massive Cyber Threat

It happened again. This time, JP Morgan, America’s largest bank, was targeted by hackers who stole contact information for 76 million households and 7 million small businesses through a variety of entry points, including the website for a corporate event. Hackers repeatedly attacked the system over a two-month period and accessed addresses, phone numbers, email addresses as well as internal JPMorgan Chase information, which may or may not include account numbers and other sensitive financial information.

Perhaps more disturbing than the sheer volume of information that the intruders took, however, is the fact that a behemoth financial institution was the victim of such a large-scale attack. Until now, the majority of network intrusions have been perpetrated on retailers, an industry that historically has been weak on cyber security. Banks, by comparison, typically spend heavily on data protection.

The question, then, for financial companies, retailers and any other business that maintains sensitive information, is whether or not they are spending on the right solutions. The fact is, many security products on the market now were not built for 10G network analysis, let alone 40G, meaning engineers may struggle to get a clear view of the entire network. WildPackets’ network monitoring and network forensics solutions, however, can give organizations unprecedented visibility across their high-speed networks and capture the network traffic to quickly respond to attacks and answer the critical questions of who, how, what and when. WildPackets’ security forensics analysis tools are built upon four primary capabilities:

  • Network Recording: capturing network traffic from 1G, 10G, and 40G networks around the clock for forensic analysis
  • Searching and Inspection: enabling administrators and security experts to comb through archived traffic for anomalies and signs of security events
  • Trend Analysis and Baselining: characterizing network and application usage so that anomalies can be detected more quickly
  • Reporting: capturing data and distilling analysis into reports so that security and IT experts can log the results of their investigations and review network vulnerabilities after an attack has taken place

At this point, the facts speak for themselves. Cyber criminals are employing more sophisticated methods than ever before and are having incredible success breaching networks as a result. It’s time for your company to fight fire with fire, or risk getting burned.

Leave a Reply