How to Avoid the ‘Mousetrap Syndrome’ of Network Security
How do we protect our data?
It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams.
We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like trying to keep mice out of the home, the struggle to fend off malicious attacks against networks is a never-ending battle.
In Silicon Valley and beyond, brilliant minds in digital security compete constantly to iterate designs — to essentially build a better mousetrap.
We’ve built mousetraps that are:
- More intelligent
- More alert
- Faster, and simpler to use
- Even some that can be controlled in real time, directly from a smart phone when you’re away
We have developed VLANs, firewalls, prioritization, ACLs, and many other traps to prevent the mice from getting in and leaving with our data. Yet still we see, time and time again, they find ways around our elaborate traps.
In the first half of 2017 alone, there were a recorded 918 breach incidents, combining to a total of 1,901,866,611 records breached. This represents a 13% increase in breaches from the last six months of 2016.
The problem is as we mentioned before: Iteration.
While we have continued to tirelessly work to improve old mousetraps, the mice are catching up, getting smarter, and growing in numbers. And the number of breaches per year is increasing at a staggering rate. The amount of actual innovation we’ve seen — paradigm-shifting, quantum leaps forward in the way we approach network security — has been alarmingly small.
Perhaps the goal should be: think outside the mousetrap.
Here at HOPZERO we think we’ve found a better way to keep that mouse out of your home. Make it expire before it has a chance to dig past your traps.
We don’t do it with traditional traps or poisons. Imagine it more like forcing the mouse to get old and die of natural causes…really, really quickly. That would be difficult with actual mice, but it’s possible with data and connections.
Imagine if all the cheese in your refrigerator were expiring today. It would be difficult to steal because, as soon as you take it out of the fridge, it’s gone bad. In a sense, this is one of the ways the HOPsphere Radius Security works. It prevents data from moving more than a predefined distance from the server without the connection expiring.
In more technical terms, the technology uses IP to define a perimeter of TTL/HOP (time to live/hop count). HOPsphere Radius Security can analyze hop count and use that information to limit the lifespan of a data packet. It learns by analyzing every packet that traverses the network.
Once we learn where data needs to go, we can adjust the hop count to only allow travel within the allowed perimeter. Any sessions extending beyond that perimeter are terminated and new connections are blocked.
If you have your ear to the ground at all in tech and network security, you know these are trying times. Our world’s data is more vulnerable than ever, and we are in need of something new to defend the privacy and data of people and organizations. HOPZERO is answering the call — not with a new mousetrap, but with a solution we believe is truly innovative.
If you’re interested in learning more, we’d love to speak with you.
If you’re involved in IT, you’ve probably heard of HOPs. But you might have asked yourself: What does HOP count mean? And why should you care?
While it’s nearly impossible to predict the future, here are four key cyber security trends for 2020 we think every infosec professional should keep tabs on.
Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise?...
Enterprise Management Associates (EMA) is a leading voice in the information security industry. With its dedication to in-depth research — and unrivaled analysis — the EMA is an important resource for data management and IT professionals...
Chinese Army purportedly inserted chips to provide hackers a connection into the back-end infrastructure where they can steal information and credentials.
Jim Rounsville is a co-founder and SVP of Professional Services for HOPZERO. A former CEO of a network service and security company building large government, utilities, and stock market systems, Jim brings over 29 years of creative executive leadership experience to his role with HOPZERO. Jim brings a wealth of experience to the HOPZERO Professional Services group, developing systems for product implementation and support management.