Over the last few years, we have seen a number of grievous security breaches where an attacker was able to access critical information in a client’s database. These internal file servers and databases contain the majority of data that cyber attackers target. Whether user lists, client databases, or other valuable business data, their information soon enters markets on the dark web. These critical systems also tend to receive a significantly smaller portion of the funding and attention than is allocated to securing other information assets.
Typical spending patterns put the majority of focus on network protection such as Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS), firewalls, and Security Event and Incident Management, also known as SEIM. It is not uncommon for an organization to spend the bulk of their information security budget on the perimeter and spend relatively little in securing what they consider business critical applications.