Titania research pegs losses from misconfigurations at average of nine per cent of annual revenue.

networking, data centre
Credit: Dreamstime

Network misconfigurations cost companies an average of nine per cent of annual revenues, according to a study released by a network security and compliance company. 

The research by Titania based on a survey of 160 senior cyber security decision makers across a broad array of government and industrial verticals also warned that misconfigurations that leave a business vulnerable to cyber attacks could be sitting on networks for months or years because of infrequent audits of connected devices.

“Networks can change on a daily basis — typically through planned activity — resulting in configuration drift,” says Titania CEO Phil Lewis. “As firewalls, routers and switches are pivotal to the security of all networks, organisations should check all their devices regularly — ideally daily — for misconfigurations, either accidental or deliberate, that could result in critical security risks.

“The fact that only four per cent of organisations assess all their network devices by auditing their switching and routing devices, as well as their firewalls, is inherently problematic and likely the result of a lack of accurate automation capability.”

Prioritising risk mitigation of network devices a challenge

The study also revealed that organisations are having trouble prioritising mitigation of risks posed by network devices. It found that 70 per cent reported difficulties prioritising remediation based on risk. They also identified inaccurate automation as a top challenge when meeting security and compliance requirements.

“The tools that many organisations currently rely upon to automate vulnerability detection are failing in making the day-to-day network security checking process more efficient and effective,” Lewis says. “It often involves sampling. This ultimately leaves networks exposed to undetected and potentially critical risks caused by configuration drift.”

Router settings often have mistakes

Organisations may be reluctant to fiddle with network misconfigurations. 

“It is very easy to ‘break’ working web apps and functioning services when changing network configuration for threat remediation,” explains Michael Assraf, CEO and co-founder of Vicarius, a vulnerability remediation company. 

“Network equipment usually runs old and lean versions of Linux, which doesn’t receive general kernel updates unless the hardware vendor releases an upgrade. Taking a snapshot and recovering from a bad configuration is also done manually and require specific expertise.”

Antiquated network architectures that depend on firewalls to protect network devices from compromise can also contribute to the risks they present to organisations. “There are many things admins can do with router settings by mistake that might accidentally bypass your firewall,” says Corey Nachreiner, CSO of WatchGuard Technologies.

“I have seen admins use a router’s multiple interfaces to inadvertently connect a second interface directly into their network, going around the firewall in the process.”

“Some switches also have alternate remote management channels that might fall outside your firewall and gateway router,” Nachreiner continues, “so it’s also important to make sure those features aren’t misconfigured and exposing your internal network switches to the world as a result.”

Switches and routers often overlooked

The report also found that routers and switches are largely overlooked. Most organisations (96 per cent) prioritise the configuration and auditing of firewalls, but only four per cent assess switches and routers, as well as firewalls. 

“Commercial routers and networking equipment have strong security protocols, which are heavily advertised,” says Ray Steen, CSO of MainSpring, a provider of IT managed services. “Network administrators trust this security, but a powerful security protocol in a product containing vulnerable code is like a three-inch steel door protecting a cardboard box. Cyber actors just break the box.”

“I think that people give more attention to personal computing and servers because it is easy to protect them,” adds Carmit Yadin, founder and CEO of DeviceTotal, maker of a risk management platform for un-agentable devices. 

“They are intuitive, while IoT and network devices are black boxes that customers purchase and plug into the network. There are no client or agent to be installed so they’re less intuitive.”

TECH NEWS RELATED

Microsoft: Windows 11 22H2 causes file copy performance hit

Microsoft has confirmed a new known issue causing customers to experience a significant performance hit when copying large files over SMB after installing the Windows 11 22H2 update. “There is a performance reduction in 22H2 when copying larger files from a remote computer down to a Windows 11 computer ...

View more: Microsoft: Windows 11 22H2 causes file copy performance hit

Card Blanch’s Unique Platform Simplifies Shopping For Consumers

(Photo : Card Blanch) Consumer spending in the U.S. is on the rise after months of economic uncertainty, reminding people about the often overwhelming number of finance and store loyalty cards they own – and that’s where one innovative app aims to revolutionize and simplify shopping for everyone. The ...

View more: Card Blanch’s Unique Platform Simplifies Shopping For Consumers

What other storms can teach us about looming mental health impacts of Hurricane Ian

Credit: Unsplash/CC0 Public Domain As residents of southwest Florida begin the arduous process of rebuilding their lives in the wake of Hurricane Ian, Tulane University experts who have studied long-term impacts of storms in New Orleans have one piece of advice: don’t ignore your mental health. Survivors are likely ...

View more: What other storms can teach us about looming mental health impacts of Hurricane Ian

How to Store Your Vinyl Records and Maintain Their Quality

Blueee77 / Shutterstock Most people are unfamiliar and uncomfortable with vinyl. They know that analog audio is fairly fragile, and are often too terrified to hold a record in their bare hands. But what happens when a record goes back into its jacket? Suddenly, it’s not such a fragile ...

View more: How to Store Your Vinyl Records and Maintain Their Quality

Twitter wants you to share tweets instead of screenshotting them

Twitter is now testing a new “Share tweet instead?” pop-up so users may stop taking screenshots of posts on the platform to share elsewhere and start driving traffic back to Twitter with a proper link. This feature was noticed yesterday by researcher Jane Manchun Wong and other users reported ...

View more: Twitter wants you to share tweets instead of screenshotting them

Only 2 Netflix movies are in the streamer’s US Top 10 today

As far as Netflix’s original movies go, it’s a bit of a light week for the streamer in its home market right now, as today’s US Top 10 movies list is dominated almost entirely by movies that didn’t actually originate with Netflix. Today’s list, in other words, mostly consists ...

View more: Only 2 Netflix movies are in the streamer’s US Top 10 today

Scientists design electrolyte for lithium metal anodes for use in lithium metal batteries

Schematic of the ion distribution of interfacial high-concentration electrolyte (upper left) and the discharge/charge voltage profiles of the conventional concentration electrolyte and the interfacial high-concentration electrolyte (upper right). The schematic at the bottom of the image illustrates the effect of the interfacial high-concentration electrolyte on lithium nucleation and plating. ...

View more: Scientists design electrolyte for lithium metal anodes for use in lithium metal batteries

Sleep mode makes Internet of Energy more energy efficient

Sleep mode makes Energy Internet more energy efficient. Credit: Reiko Matsushita A group of scientists in Nagoya University, Japan, have developed a possible solution to one of the biggest problems of the Internet of Energy, energy efficiency. They did so by creating a controller that has a sleep mode ...

View more: Sleep mode makes Internet of Energy more energy efficient

Finding the chiplet integration technology with the simplest scheme

Google's 2nd-gen wired Nest Doorbell delivers better image quality

Biden Signs Executive Order to Preserve US-EU Data Transfers

Apple Is Unlikely to Reinstate Touch ID, to Revamp Face Recognition Instead: Reports

The Parenting Tech Market is Flooded yet Chronically Underserved. Could this AI Cut Through the Noise?

Mariners vs. Blue Jays Livestream: How to Watch the Wild Card Series Without Cable

15 Best Lock Screen Widgets for Apple iPhone

Deal reached for civil aviation to try for net-zero emissions by 2050

EPA could get tough on leaded fuel in airplanes

InSight Mars lander waits out dust storm

Reign of Papua New Guinea's megafauna lasted long after humans arrived

Crypto exchange Binance suffers $570 million hack

OTHER TECH NEWS

Top Car News Car News