Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay

What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year.

What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year. Critical infrastructure was held captive, creating a public inconvenience for residents trying to access to park permits, public records and other online services.

There will certainly other names added to this list, and soon. Why? Because ports and city governments are an economic gateway, providing critical services that when brought to a halt, result in significant lost dollars. This gives attackers leverage, knowing that these entities cannot afford extensive downtime.

Why Ports and Why Now?

Traditionally, local and federal governments have a history of poorly maintained cyber infrastructure, creating an obvious opportunity for exploitation. This is not due to any fault of their own, but rather to the fact that these entities provide a conglomeration of services, with information shared back and forth, and no central cyber strategy or individual in charge. They are essentially huge extranet services platforms, with data exchanges, application exchanges and interdependencies that funnel all the way down to local residents and consumers.

These dependencies, particularly on external vendors, create additional vulnerabilities as attackers can target those entry points to make their way to the port or government organization itself. The Target breach in 2013 is proof of how attackers can work their way into an organization’s network by compromising a third-party vendor. The scary truth is that it only takes one vulnerable point of entry for malicious actors to work their up the food chain and reach a port’s critical infrastructure.

Traditional Security Approaches Aren’t Enough

Many organizations falsely believe they are immune to ransomware and other cyber threats because they haven’t been a target, yet. Plus, traditional intrusion detection and patch management solutions give ports a false sense of security. These approaches do not provide a sufficient layer of protection on their own, as they are unable to effectively be applied to the multiple vendors — and endless consumers — doing business with the port. After all, a port has zero visibility into what cybersecurity methods are being used by local city residents, or even major shipping lines. When you don’t have a true view of all of the components that may potentially host malware, this creates blind spots for detection-based products, ultimately degrading the effectiveness.

Don’t Trust What You Can’t Control

Our hyper-connected way of doing business today makes it increasingly difficult to trust anyone or anything. If you accept the fact that most of networks will eventually get hacked, due to the increased connectedness and complexity of business operations, embracing Zero Trust is a great way to limit the damage.

Zero Trust, which originated out of Forrester Research nearly a decade ago, believes that organizations should not assume that anything inside or outside their network perimeter can be trusted. While it would be ideal for ports and government organization to restrict the exchange of information with parties, computers or networks that they don’t control, it’s would make doing business nearly impossible.

Zero Trust cannot be proactively applied everywhere, including for front-end systems used to power many business exchanges. However, for your most critical information, which you cannot afford to lose and over which you have 100 percent of control, you can add a much-needed layer of protection.

Maybe it is only applicable for a quarter of your business, but you start there — walling off critical systems from any systems that don’t meet those two criteria. Embracing Zero Trust where you can and making sure that critical pieces of your business that have no reason to be visible to the rest of the world are not connected to even the most secure perimeter is a must to keep cyber threats at bay.

The Critical Role of Segmentation

Segmentation is a must-have element to a Zero Trust approach, limiting the risk that comes with access and limiting access to the portions of information you can control. When embarking upon Zero Trust, shifting to a network segmentation philosophy has the quickest impact and the highest payoff, allowing you to protect systems in which security wasn’t traditionally a requirement.

When done right, segmentation shouldn’t impact productivity in order to enhance security. Neither should take a hit. Your systems should be protected without impacting day-to-day operations. Your employees, vendors and consumers should still have secure connectivity and access to desired information wherever and wherever it’s needed. Plus, segmentation should give you the peace of mind that your most critical infrastructure is secure without requiring network configuration changes, significant IT management oversight or dependence on external network infrastructure. Translation – it shouldn’t require heavy lifting or hard work.

Maintaining the integrity of your infrastructure is imperative to the livelihood of your business, your community and our economy. Minimizing the very real and advanced threats to critical systems, as well preventing the downtime of those systems, has to be a top priority. By taking advantage of segmentation, you can trust that you are taking critical steps needed to protect your infrastructure today from the looming threats of tomorrow — and help you stay off the growing list of ports weren’t as well prepared.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3