5 Takeaways from the Cisco WikiLeaks Bombshell

WIKILEAKS BOMBSHELLBy now you’ve likely heard about the WikiLeaks Vault 7 Leak and which network devices are vulnerable to attack. According to TechTarget’s SearchSecurity news site channel, “Cisco found and mitigated a security vulnerability that affects more than 300 models of its switches. The vulnerability is said to be one found in the Vault 7 documents posted on WikiLeaks…” You can read more about the backstory by going to the Cisco blog. For their part, Cisco immediately identified steps customers should take if affected by this latest threat.

Unfortunately, network security vulnerabilities will not go away. As it goes with network issues, the vulnerability was resolved and engineers throughout the industry will move on to face other challenges. Yet the current Vault 7 situation reminds us all to take a closer look at our networks for potential issues in all devices that touch your network. It’s a lot like when one of our neighbors reports a house break in and everybody on the block double checks their locks.

With this in mind, here are five takeaways from Vault 7 leak.

  1.  Be the first to spot vulnerabilities in your network. Nobody enjoys being in reactive mode, especially your customers.
  2.  Know your network to avoid surprises. This is getting more complex as traditional and software-defined WAN technologies proliferate, not to mention the bandwidth demands of voice and video applications. For this reason, you need a big picture, or end-to-end topological view of your network devices to identify vulnerabilities and potential issues before damage is done.
  3. For that big picture view to make sense, you also need situational awareness of what’s going on in the network. Otherwise, you end up with myopic decision making about what stays, goes or is a potential threat to the network.
  4. When a threat is detected, quickly change device paths to limit the potential risk. This is a lot like knowing the shortcuts in your neighborhood when a street is under construction. If there aren’t any workarounds, like the situation with the Vault 7 leak, you should be able to play back historical views and analyze network flows at any given point in time to get to the source of the issue.
  5. Don’t just monitor devices and applications, have a system in place that recommends resolutions before a potential problem impacts network performance.

Complete visibility of your network environment will help you to see in real-time if someone or something is exploiting flaws that are present in any and all network gear.

Learn more about how LiveNX provides continuous insight into your enterprise infrastructure for security objectives.