Properly securing and maintaining privileged accounts is essential. Unfortunately, advanced hackers continue to discover vulnerabilities, exploits, and tactics to breach well-secured IT infrastructures. For example, requiring users to regularly change their passwords increases security, but many people change their passwords in predictable ways, e.g. changing only a few characters or appending numbers or letters.
Although attackers may create activity or event logs when using compromised privileged accounts to access critical assets and information, the use of legitimate privileged accounts makes it difficult for many traditional security platforms to identify such abuse. For example, file shares are a desirable target for hackers, but also are used for legitimate activity. Organizations need to closely monitor these activities 24 hours a day, 7 days a week.
Blackpoint’s 24/7 Managed Detection and Response (MDR) service keeps a constant watch over all privileged activity occurring on the network. Our live monitoring detects in real-time high-risk, privileged activity and our patented technology allows our analysts to investigate the activity to quickly determine its intent. We can detect unusual lateral movement within a network as well as remote access to critical assets.
When our MDR analysts discover malicious activity they can take immediate response by isolating compromised devices, preventing the attack from spreading across the network. If the attacker is executing a vertical privilege escalation, which is when an attacker compromises a lower-level account and then uses it to gain higher-level privileges, Blackpoint’s MDR analysts can immediately terminate any processes being used to carry out the attack.
To learn more or to schedule a demo of Blackpoint’s technology, please visit
https://blackpointcyber.com/managed-detection-and-response/.