Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year.

What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year. Critical infrastructure was held captive, creating a public inconvenience for residents trying to access to park permits, public records and other online services.

There will certainly other names added to this list, and soon. Why? Because ports and city governments are an economic gateway, providing critical services that when brought to a halt, result in significant lost dollars. This gives attackers leverage, knowing that these entities cannot afford extensive downtime.

Why Ports and Why Now?

Traditionally, local and federal governments have a history of poorly maintained cyber infrastructure, creating an obvious opportunity for exploitation. This is not due to any fault of their own, but rather to the fact that these entities provide a conglomeration of services, with information shared back and forth, and no central cyber strategy or individual in charge. They are essentially huge extranet services platforms, with data exchanges, application exchanges and interdependencies that funnel all the way down to local residents and consumers.

These dependencies, particularly on external vendors, create additional vulnerabilities as attackers can target those entry points to make their way to the port or government organization itself. The Target breach in 2013 is proof of how attackers can work their way into an organization’s network by compromising a third-party vendor. The scary truth is that it only takes one vulnerable point of entry for malicious actors to work their up the food chain and reach a port’s critical infrastructure.

Traditional Security Approaches Aren’t Enough

Many organizations falsely believe they are immune to ransomware and other cyber threats because they haven’t been a target, yet. Plus, traditional intrusion detection and patch management solutions give ports a false sense of security. These approaches do not provide a sufficient layer of protection on their own, as they are unable to effectively be applied to the multiple vendors — and endless consumers — doing business with the port. After all, a port has zero visibility into what cybersecurity methods are being used by local city residents, or even major shipping lines. When you don’t have a true view of all of the components that may potentially host malware, this creates blind spots for detection-based products, ultimately degrading the effectiveness.

Don’t Trust What You Can’t Control

Our hyper-connected way of doing business today makes it increasingly difficult to trust anyone or anything. If you accept the fact that most of networks will eventually get hacked, due to the increased connectedness and complexity of business operations, embracing Zero Trust is a great way to limit the damage.

Zero Trust, which originated out of Forrester Research nearly a decade ago, believes that organizations should not assume that anything inside or outside their network perimeter can be trusted. While it would be ideal for ports and government organization to restrict the exchange of information with parties, computers or networks that they don’t control, it’s would make doing business nearly impossible.

Zero Trust cannot be proactively applied everywhere, including for front-end systems used to power many business exchanges. However, for your most critical information, which you cannot afford to lose and over which you have 100 percent of control, you can add a much-needed layer of protection.

Maybe it is only applicable for a quarter of your business, but you start there — walling off critical systems from any systems that don’t meet those two criteria. Embracing Zero Trust where you can and making sure that critical pieces of your business that have no reason to be visible to the rest of the world are not connected to even the most secure perimeter is a must to keep cyber threats at bay.

The Critical Role of Segmentation

Segmentation is a must-have element to a Zero Trust approach, limiting the risk that comes with access and limiting access to the portions of information you can control. When embarking upon Zero Trust, shifting to a network segmentation philosophy has the quickest impact and the highest payoff, allowing you to protect systems in which security wasn’t traditionally a requirement.

When done right, segmentation shouldn’t impact productivity in order to enhance security. Neither should take a hit. Your systems should be protected without impacting day-to-day operations. Your employees, vendors and consumers should still have secure connectivity and access to desired information wherever and wherever it’s needed. Plus, segmentation should give you the peace of mind that your most critical infrastructure is secure without requiring network configuration changes, significant IT management oversight or dependence on external network infrastructure. Translation – it shouldn’t require heavy lifting or hard work.

Maintaining the integrity of your infrastructure is imperative to the livelihood of your business, your community and our economy. Minimizing the very real and advanced threats to critical systems, as well preventing the downtime of those systems, has to be a top priority. By taking advantage of segmentation, you can trust that you are taking critical steps needed to protect your infrastructure today from the looming threats of tomorrow — and help you stay off the growing list of ports weren’t as well prepared.

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.