Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them
ITSecurity

Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them

Marcsollars
Marcsollars
4 Min Read
Image
SHARE

Image

Image

Today’s digital attackers show extraordinary sophistication, long-term planning, and guile. Threats are burrowing inside company networks every time the network is busy. Peak demand events, like stores’ sales and Holiday shopping, give criminals cover to introduce malware onto networks – or carry out exploits such as harvesting consumers’ personal details using malware dropped on the network months before. 

More Read

The Small Business Guide to Data and Network Security
Organization’s Data Protection: Be Aware of the Different Ways Hackers Attack
The Cloud and the Digital Divide
NoSQL Databases: 4 Game-Changing Use Cases
The 4 Advantages of Choosing a Cloud BI Provider

Recently, hackers of Wendy’s and Yahoo downloaded millions of records weeks after infecting their IT infrastructures. Verizon estimates that network threats lie undiscovered for 207 days on average. In order for retailers to stop these threats from happening, they must pay special attention to the activity on their network during peak traffic times.  A good place to start is by examining the threats inside the network. 

Businesses accept that armies of botnet computers can take down a website; retail executives have to harness their own computing resources in a benevolent way, on a correspondingly gigantic scale, to neutralise threats inside their networks. This can be achieved based on innovations including: Next generation tools such as data-analytics and machine-learning to embed security systems, automated threat management and behavioural attack detection resources can help retailers manage the huge task of examining threats hidden in IT infrastructures amid soaring traffic. CIOs can use automated systems to review data crossing their networks even in these conditions – detecting threats that even recently-released proprietary security solutions can no longer identify. 

New technologies that look at automated and behavioural threat detection break new ground in identifying these threats within the network. This is because they are bridging the gap between the firewall and the security information and event management (SIEM), and can monitor network east to west traffic far more efficiently than human-led interventions. For instance, a retailer running a SIEM system may indeed identify threats on the network from the logs, but just applying the system isn’t enough. To truly combat the security breach, the retailer needs to look at the packets within the network that is able to provide early warning in determining factors such as whether the attack was isolated, what was altered in the attack and how it entered the network; and without artificial intelligence they would have to do this manually. 

Retail IT teams will also need to determine malware behavior patterns and plot how such attacks will play out in the future using tools such as cognitive algorithms; this innovation is an intelligent way to fight off hackers’ zero-day threats that exploit corporate system vulnerabilities that are still unknown to their IT team.

Most of all, retail executives need to build a flexible security posture and practical measures that constantly evolve – just as criminal threats do. And when an IT team does enact a mix of machine learning and artificial intelligence  resources to number-crunch the mass of network traffic for big events like Black Friday – or any other big retail promotion – boards might be pleasantly surprised to learn that these tools can be hooked up to their company network by a simple local network connection.

 

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive
data science importance of flexibility
Why Flexibility Defines the Future of Data Science
Big Data Exclusive
payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Get the Most Out of Your Oracle Application

5 Min Read

Four Key Steps For Enterprise IoT Security

7 Min Read
dreamstime l 217658546
Artificial Intelligence

The Role of Artificial Intelligence in Enhancing Data Security

6 Min Read
Image
ITSecurity

Yahoo reveals another hack impacting 1B user accounts

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?