- About Us
- Infosys Knowledge Institute
Cyberattacks continue to grow in scale and sophistication every day. On average it takes around 200 days to detect a breach. 1 All things considered, a breach can become a multimillion-dollar problem for the affected business. In 2019, the World Economic Forum reported that cyberrisks are consolidating their position alongside environmental risks in the high-impact, high-likelihood quadrant of the global risks landscape. 2 The global loss from cyberattacks in 2018 totaled $1.5 trillion; in 2019 this amount could rise to $2.5 trillion. 3
Cybercriminals are powerful, difficult to identify and capable of constantly developing new ways to penetrate secured systems. To effectively repel attacks, security teams must undergo continuous training and be able to access the latest solutions and tools. But keeping pace with offenders is difficult and expensive. Adopting new technology and ensuring timely implementation is a major challenge. Often tools become obsolete by the time they are implemented. Moreover, a company may lack sufficient funds to acquire new tools, and even if it has funds, it might lack the skilled personnel needed to operate these tools.
The deficit in cybersecurity talent is a major concern. Finding the right IT and computer science professionals is challenging because the global cybersecurity workforce will have 1.8 million unfilled positions by 2022. 4 In particular, there is a significant lack of skills in the areas of analytics, intelligence, rapid response to incidents and investigation. There is also a lack of technical skills for work with security operation centers. We are no longer in the era where a business can be protected by a firewall alone. The skills discussed here are relevant for the new types of threats, and MDR services can fill in the gaps of personnel.
Constantly changing regulations are also making cybersecurity more complex. The best known such regulation is the General Data Protection Regulation (GDPR).
Businesses that operate in the European Union (EU) or offer goods or services to individuals located in the EU must comply with the GDPR, which went into effect May 25, 2018. Every such business is legally required to be compliant with GDPR as it protects online spaces and systems against criminal activities that threaten the loss of data and money. Under the GDPR, personal data breach notifications became obligatory. Once data processors identify a breach, companies must notify those whose data was breached “without undue delay,” and in no case not more than 72 hours after the company becomes aware of the breach. 5 Stringent regulations are difficult to comply with, especially if an entity does not have the capabilities to detect, address and mitigate the threats.
Apart from the lack of skilled talent and stringent regulations, poor security awareness is also a problem. In March 2019, Infosys surveyed 867 senior executives and leaders involved in cybersecurity initiatives and found that their top security concerns included low awareness in organizations, corporate espionage and insider threats.
Cyberattacks pose serious risk to organizations. One problem is that many business people may not believe that hackers will target their organization. They may believe that their organization is too small to be on the radar of the criminals or that it has nothing worth attacking. It is important to understand that losses incurred by companies from data breaches are not limited to money. Reputational losses, customer outflows and network restoration work can lead to much larger consequences. The truth is that malicious actors tend to be indiscriminate in their attacks and can almost always find something of value to target. In many cases, enterprises don’t even know they have been breached.
For example, the following three hacks involved delayed breach detection and show how this can be an issue even for the largest brands.
The Yahoo hack is considered to be the biggest known data breach of a company’s computer network in history. Hackers broke into Yahoo in 2013, but the company only uncovered the breach in 2016. The breach affected all 3 billion accounts that existed in 2013. Digital thieves were able to access personal data such as first and last names, dates of birth, email addresses, phone numbers and passwords.
In 2018, the international hotel chain Marriott announced a massive data breach affecting half a billion people. In mid-September 2018, Marriott staff discovered an attempt to gain unauthorized access to the Starwood reservation system base. The investigation that followed revealed that penetration into the system occurred back in 2014, that is, two years before Marriott acquired Starwood. The data of 327 million Starwood guests was stolen, including their names, postal addresses, birthdates, phone numbers, passport details and account information, as well as data on preferred methods of communication. For other users, only names, emails and email addresses were considered compromised.
In 2017, Equifax, one of the world’s largest credit bureaus, said their database had been hacked, causing personal information of more than 143 million people to be compromised. Hackers gained access to social security numbers, birthdates, consumer names, driver’s license numbers and credit card information. The attack was detected at the end of July 2017, but hackers had penetrated the company’s servers in May of the same year. 6
These recent big hacks demonstrate how easily cybercriminals can bypass cybersecurity and remain undetected for months. Times are changing, and having merely preventive measures is no longer enough. An entirely new approach to cybersecurity is necessary.
All the factors combined make for a complex security landscape. Cybersecurity is a vast area that requires various sets of skills to deal with access management, government risk and compliance, data security, security monitoring, incident response and others. Often, in-house security teams lack relevant expertise in constantly evolving tools and spend a lot of time dealing with large volumes of log data. They struggle with managing systems and tools, and have little time to thoroughly investigate and analyze an incident. But there are external services that can provide the necessary support.
In the last couple of years, MDR has emerged as a new approach to information security. MDR programs are specialized, outsourced security services that are focused on identifying and responding to information security incidents. Compared to managed security services, MDR services can detect known and unknown threats. They can go beyond sending alerts and actually respond to threats as they happen, providing endpoint detection and response solutions. Unlike MSS, which can detect only known incidents, MDR providers can detect and prevent even complex targeted attacks.
Quality MDR services effectively eliminate false alarms, detect real security threats and develop a fast incident response in real-time. While the average time for detection of a breach is close to 200 days, MDR services allow faster detection and response because they employ their own technology stack. They bring an EDR solution, which allows to respond faster to potential incidents and to detect attacks that have gone unnoticed. MDR services consequently minimize the damage that breaches can have on security systems.
Furthermore, MDR services address the challenges arising from the lack of security skills within organizations. While some organizations can afford upskilling and the creation of an SOC to conduct full-time threat hunting, the majority of businesses face resource constraints and look for alternative solutions. This is a problem even for medium-sized and large enterprises, which often suffer from cyberattacks but lack the capabilities and manpower to provide an effective response to the hackers.
A 2019 Infosys survey found that the most common requests from clients are “end-to-end cybersecurity and protection” as well as the ability to “assess, build, and manage cybersecurity capabilities that enable a response to incidents.
Often EDR solutions do not reach their maximum potential due to a lack of time, skills and expertise in handling the EDR tools. Advanced EDR tools form the core of MDR services and play a critical role in detection, analysis and response functions.
There are two main things to look at. First, traditional MSS provides standard security monitoring such as threat monitoring, compliance, reporting and incident response services. MDR services expand this by also bringing EDR as well as threat containment, research and managed threat hunting. (See Figure 1)
MSS is a predecessor of MDR services. The most active MSS providers track security events and send alert messages if anomalies are detected. These services don’t investigate the anomalies for elimination of false positives, i.e., something mistakenly called an error, and they don’t actively react to security threats. However, some MSS providers do offer other network services like virus protection and firewall management.
MDR services don’t simply provide threat notifications — for example, they respond and contain threats by shutting down ports or changing VLANs. MSS services don’t include the endpoint. They simply notify their users or, at most, make changes to managed equipment. MSS services manage the tools and alert the users, while MDR services collect data from tools and endpoints. This allows MDR providers to determine whether a company can be or has been breached.
Figure 1. Differences between MDR Services and MSS
|Detects known (signature-based) threats||Yes||Yes|
|Detects unknown threats||Yes||No|
|Analyzes log threats and provides incident response||Yes||Yes|
|24/7 monitoring by a staffed security operations center||Yes||Yes|
|Purpose-built technology for signal enrichment and event correlation to reduce false positives||Yes||No|
|Provides threat research||Yes||No|
|Provides tech stack (EDR, deception, etc.)||Yes||No|
|Provides threat containment||Yes||No|
Overall, MSS providers help concentrate investigation efforts, leaving it up to a company to decide whether or not to perform the actual investigation, to prepare responses and to eliminate false positives. MDR providers, on the other hand, offer IT security service with reduced time for threat detection. They combine a technological solution with outsourced human security analysts. The expert team usually includes forensic analysts, experienced security professionals, incident respondents, threat hunters and others. MDR services detect intrusions, malicious activity and malware in a network. They help to react fast to eliminate and mitigate threats.
Reliable data protection, IT infrastructure security, stable business processes and compliance with regulations are mandatory conditions for the sustainable development of modern businesses. Businesses grow more dependent on information technologies when they try to automate corporate processes.
When an organization integrates more IT into its systems, its risk of being hacked increases.
Companies require an experienced team of specialists to manage threats and provide an appropriate response to guarantee secure operation of the IT systems. Without such expertise and staff, companies’ cybersecurity teams often struggle with managing systems and tools, leaving little time to thoroughly investigate and analyze incidents.
It is critical for any organization with sensitive information that might be attractive to cybercriminals, to have an effective response to attempted hacks. Because the nature of their businesses makes their information high-value targets for cybercriminals, health and financial services providers are the most obvious organizations in need of effective detection and response services. These organizations often lack complete, functional SOCs and struggle with recruiting and retaining on-demand cybersecurity professionals.
The skills that are relevant to the new types of cyberthreats are going to be difficult to build in-house. The demand for qualified cybersecurity professionals, threat readiness, GDPR compliance and 24/7 monitoring will drive more outsourced players into offering MDR services. Corporations that understand the value of MDR will be best positioned to evaluate MDR suppliers and their capabilities.