TEMSSEC Offensive & Defensive Cybersecurity approach

Traditional methods of defending against cybersecurity attacks are defensive in nature to include the following.

  • Educating the users to be weary and careful not to visit dodgy looking websites
  • Not clicking on email messages from unknown senders
  • Installing & Configuring Firewall protection
  • Keep Software & Systems upgraded to latest versions and up to date
  • Encryption of all data in transit and at rest
  • Sensible Password Management
  • Access Management
  • Backup data
  • Control Access to your systems
Most organisations have employed all these methods for the last 30 years or so, but it has not worked, as we can see from daily news reports of hacking & ransomware. The fact is that more than 85% of organisations globally are vulnerable to cybersecurity breaches.

So, at TEMSCONSU we went back to the drawing board.

Some writing in 1799 attributed to George Washington, the first United States of America President says it all “offensive operations, often, is the surest, if not the only (in some cases) means of defence.” “The best defence is a good offense.”

An additional and more effective approach to cybersecurity warfare attacks from Countries such as China, Russia, other former European Eastern Bloc countries or even hackers based in the west needs to be focussed more on Proactive/Offensive Cybersecurity practices such as;

  • Using emerging Information Technology such as Artificial Intelligence/Machine Learning, Automation type technology to actively analyse, seek out, pre-empt and stop attacks before they even happen or are conceived.
  • Seek to learn more, gather data, profile potential attackers, and get on the offensive in attacking or disrupting the activities of such cybersecurity criminal groups IT Networks.
“We profile the profiler, and the hunter becomes the hunted”.

Proactive/Offensive cybersecurity policies prescribes taking the fight to the cybercriminals, disrupting them in their stride and perhaps provide punitive digital punishment to serve as a future deterrent from simple steps such as the following below to even more draconian ones as necessary.

  • Remotely wipe the computer clean from which the perpetrator is operating from whenever possible.
  • Dismantle or disrupt whatever IT Network that they are operating from.
  • Digitally wreck as much damage as possible on the whatever host servers or platforms they are operating from.
  • Digitally gather enough data to be able to prosecute any individuals or groups who have committed cybercrimes.
Cybersecurity governance helps but is not the answer to the current cyberwarfare or ransomware attacks, the expression using fire to fight fire comes to mind, but even better than that using modern and advanced IT precepts to pre-emptively stop such attacks in the conception stage must be the way forward.

Relying mainly on governance or antiquated/traditional methods such as firewalls, encryption, password & access management etc can be likened to going to a gunfight with a knife and expecting to prevail.

After the 9/11 terrorism attack, security agencies have stopped several attacks in the conception stage, we must now do the same for cyberwarfare, since we now know that the digital world can be weaponised and used to attack countries.

At TEMSCONSU, we are continuously researching and building digital products to include those that provide both an Offensive and Defensive Approach to combating cyberattacks & ransomware which has led to developing TEMSSEC.

TEMSSEC provides a software offensive layer to effectively combat cybersecurity.

Want to know more – contact us