top of page

How Guerrilla Warfare Explains the Cybersecurity Crisis




To understand why the cybersecurity environment for many organizations continues to deteriorate, cast your mind back to the American Revolution and the battles of Lexington and Concord. Lightly armed, fast-moving revolutionaries ambushed, raided, and routed the British forces before melting back behind the woods and buildings that concealed them. Those skirmishes have become among the most famous examples of guerrilla warfare, and they illustrate why, to this day, insurgencies and asymmetrical conflicts remain stubbornly difficult to win.

 

Cybersecurity is guerrilla warfare

This has everything to do with cybersecurity. Most organizations fail to act as if they are in an asymmetrical conflict with hackers, ransomware rogues, and data thieves. Instead, they build up higher walls, deeper moats, and better radar while failing to see that they are just as visible—and as vulnerable—as the British were their red coats. All the while, bad actors circle around unmissable targets probing for weaknesses, which they often find to devastating effect. After all, high walls do nothing when invaders can slip through the gates. Stolen or compromised credentials, phishing, and cloud misconfigurations are the three biggest initial attack vectors, according to the most recent IBM Security/Ponemon Institute Report.

 

The price organizations must pay is eyewatering. The average cost of a data breach in the US is $9.44 million, and 83% of organizations have had more than one data breach. Once the enemy is in, it takes ages to root them out—277 days on average but even higher for phishing attacks. The pace is relentless. The University of Maryland found that cyberattacks happen once ever 39 seconds.

 

How to fight back

Step one is to stop doing more of the same thing and expecting a different result.

 

Next up: start thinking about the terrain. Instead of lighting your data up like a video game side quest, hide it. Now, that may make you wonder how you’re going to use hidden data? But that’s where Xinsere comes in. We use a patent-pending system called Distributed Permissioned Data to fragment, obscure, and bind permissions for your data, enrobing it in layers and layers of defensive, impenetrable fog. Without a clear target, hackers have no idea where to look, and they’ll bloody their noses should they even try.

 

Last, cut off unauthorized access. By binding data permissions to an immutable and auditable blockchain, Xinsere neuters the threat of compromised credentials, misconfigurations, and phishing. All the while, those permissioned to use your data enjoy a highly performant, easy-to-use collaboration and storage system integrated natively into the OS. It’s maximum security collaboration.

 

Guerrilla warfare has defeated many conventional armies, just as conventional cybersecurity has left too many enterprises vulnerable. With Xinsere securing your data and guarding your collaboration, your business can thrive, no matter how shadowy the threats.

4 views

Recent Posts

See All
bottom of page