Understanding user behaviour is essential for preventing cyber attacks

Main visual : Understanding user behaviour is essential for preventing cyber attacks

Every organisation needs to be operating on the premise that some form of data breach or security incident is inevitable. While many of these incidents cause limited damage, and can often go unnoticed, it is impossible to ignore the growing frequency of high profile cyber security attacks on Australian organisations.

Unfortunately, cyber attacks very rarely announce themselves by design. In fact, their ability to slip through the cracks in traditional security solutions is the reason they’re still so effective. In one survey, 44% of Australian CSOs said they believe that phishing attacks were still the biggest security threat they faced because they prey on human errors in judgement.

While an extremely damaging variant of the same methodology, ransomware is the scourge that every CSO is now trying to protect themselves from, before they end up becoming the next headline. With several high-profile attacks taking place in Australia this year, ransomware in Australia nearly tripled in the first six months of 2020 alone. 

But we also need to consider the attacks that occur from inside our organisations. According to Verizon research on insider threats:

  • 57% of database breaches involved insider threats
  • 20% of cybersecurity incidents are due to misuse of privileges
  • 61% of internal actors are not in positions with a high level of access or stature

However, effectively fighting insider threats has previously been complex and difficult. While secure remote access has become critical to effective operations in our “new normal” this means rethinking the old concepts that any device or user inside the secure network can be trusted – instead switching to Zero Trust models in which access to business systems is granted when a trusted person with the correct identity and credentials requests it.

Preventing the most damaging cyber attacks requires us to go further. User and entity behaviour analytics (UEBA) have been developed to build profiles and behaviours of users, entities, and applications to help in spotting anomalous and suspicious behaviours that could indicate threats of malicious insiders or external attackers.

Fujitsu’s User Entity and Behaviour Analytics Service provides organisations a key differentiator in their security posture and ability to mitigate the ever growing threat landscape. Our User Behaviour Intelligence Platform offers:

  • User Visibility: A lightweight collector captures complete audit trails in real-time. It is scalable, privacy-conscious, and provides online and offline visibility.
  • User Behaviour Intelligence: Advanced intelligence pinpoints suspicious user behaviour as well as both “known-bad” behaviour patterns and baselines normal behaviour to detect anomalies.
  • Analytics: Machine learning baselines individuals’ normal user behaviour and alerts on suspicious anomalies or red flags
  • Actionable Alerts: Produces alerts based on an entity’s risk score. This “alert stacking” means that analysts only receive an alert when the user’s total risk score reaches a pre-defined threshold, reducing noise and false positives.

With Fujitsu’s UEBA Platform, we provide you with the core components for the speedy detection, intelligence and alerts to enable fast response and remediation of security incidents in addition to enabling retrospective analysis to support security investigations and compliance requirements. As the threat landscape continues to evolve, we’re pleased to offer the next generation of Zero Trust security solutions that will keep your organisation and its data secure.

Editor's Picks

Winning with AI: What Australian businesses need to do next
2024 was a pivotal year for AI, with widespread adoption of AI across industries. However, this sur…
Fujitsu / January 17, 2025
The CISO’s guide to Microsoft 365 security: your immediate actions to avoid hidden risks before it’s too late
During the pandemic, organisations had no choice but to rapidly shift to cloud services like Micros…
Fujitsu / January 15, 2025
Why manufacturers’ focus on costs is hampering sustainable growth
The potential to build sustainable and resilient operations is on the minds of every manufacturer t…
Fujitsu / January 15, 2025