Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them
ITSecurity

Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them

Marcsollars
Marcsollars
4 Min Read
Image
SHARE

Image

Image

Today’s digital attackers show extraordinary sophistication, long-term planning, and guile. Threats are burrowing inside company networks every time the network is busy. Peak demand events, like stores’ sales and Holiday shopping, give criminals cover to introduce malware onto networks – or carry out exploits such as harvesting consumers’ personal details using malware dropped on the network months before. 

More Read

VPN data security
How Big Data Provides A Pivotal Foundation For VPN Data Security
Strengthen Your Cybersecurity Posture: 20 Steps To Take In 2020
On-Demand Supercomputing
What Enterprises Can Learn from Major Events and Surprises in 2011
5 Things to Consider When Choosing the Right Cloud Storage

Recently, hackers of Wendy’s and Yahoo downloaded millions of records weeks after infecting their IT infrastructures. Verizon estimates that network threats lie undiscovered for 207 days on average. In order for retailers to stop these threats from happening, they must pay special attention to the activity on their network during peak traffic times.  A good place to start is by examining the threats inside the network. 

Businesses accept that armies of botnet computers can take down a website; retail executives have to harness their own computing resources in a benevolent way, on a correspondingly gigantic scale, to neutralise threats inside their networks. This can be achieved based on innovations including: Next generation tools such as data-analytics and machine-learning to embed security systems, automated threat management and behavioural attack detection resources can help retailers manage the huge task of examining threats hidden in IT infrastructures amid soaring traffic. CIOs can use automated systems to review data crossing their networks even in these conditions – detecting threats that even recently-released proprietary security solutions can no longer identify. 

New technologies that look at automated and behavioural threat detection break new ground in identifying these threats within the network. This is because they are bridging the gap between the firewall and the security information and event management (SIEM), and can monitor network east to west traffic far more efficiently than human-led interventions. For instance, a retailer running a SIEM system may indeed identify threats on the network from the logs, but just applying the system isn’t enough. To truly combat the security breach, the retailer needs to look at the packets within the network that is able to provide early warning in determining factors such as whether the attack was isolated, what was altered in the attack and how it entered the network; and without artificial intelligence they would have to do this manually. 

Retail IT teams will also need to determine malware behavior patterns and plot how such attacks will play out in the future using tools such as cognitive algorithms; this innovation is an intelligent way to fight off hackers’ zero-day threats that exploit corporate system vulnerabilities that are still unknown to their IT team.

Most of all, retail executives need to build a flexible security posture and practical measures that constantly evolve – just as criminal threats do. And when an IT team does enact a mix of machine learning and artificial intelligence  resources to number-crunch the mass of network traffic for big events like Black Friday – or any other big retail promotion – boards might be pleasantly surprised to learn that these tools can be hooked up to their company network by a simple local network connection.

 

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

cloud dataops for metering
Taming the IoT Firehose: How Utilities Are Scaling Cloud DataOps for Smart Metering
Cloud Computing Exclusive Internet of Things IT
ai in video game development
Machine Learning Is Changing iGaming Software Development
Exclusive Machine Learning News
media monitoring
Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
Analytics Exclusive Infographic
data=driven approach
Turning Dead Zones Into Data-Driven Opportunities In Retail Spaces
Big Data Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

What You Need to Know About Data Protection in Virtual Environments

15 Min Read
Image
AnalyticsBest PracticesBig DataCollaborative DataCulture/LeadershipExclusiveMobilityModelingPredictive AnalyticsSocial Data

Is the Purpose of Analytics Just to Turn a Buck?

4 Min Read

Another Analyst, Nucleus Research, Has Optimistic Outlook on IT Spending

4 Min Read
data protection for SMEs
Data Management

8 Crucial Tips to Help SMEs Guard Against Data Breaches

10 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?