A Look into Enterprise Cybersecurity: Curing the Ignorance - Infopulse
image of banner

A Look into Enterprise Cybersecurity: Curing the Ignorance

There is a persistent opinion, luckily discarded by many owners of business applications for good, that large software systems are not subjects of interest for “pro” hackers. Such ignorance can result in horrendous unforeseen consequences. Hackers can take advantage of a system vulnerability, carry out an elaborate attack on it and deal excessive damage to the company reputation. What can we do to counteract the security neglect? Read on to learn more about the scale of the contemporary cybercrime market and what measures are taken to minimize the risks.
TU-Automotive Detroit - Infopulse - 24

Seems like it was just some years ago, when hackers were still acting on their own. Lone wolves, guys next door – anyone could secretly be a hacker: one of your neighbors, your brother or your friend. While more and more tools become available for newbie hackers, allowing to easily getting confidential information (personal data, bank accounts, etc.), cyber crimes have grown in scale. Today’s cybercrimes moved from personal data thefts to industrial espionage and cyber terrorism, where foreign governments, organized groups, and big companies are involved. The contemporary world of cybercrime does not consist of a one-man show anymore but is a huge self-sufficient industry. Similar to a legal IT market, a black market for hackers now offers the full range of corporate cracking service packages, including access to a certain server, operating a navigation system with a botnet, DoS attacks on certain networks or hubs and a possibility to buy entire personal databases together with their passwords and accounts.

Like any unregulated, efficient economy, the cybercrime ecosystem has quickly evolved to deliver many tools and services to anyone aspiring to criminal behavior. This ‘cybercrime-as-a-service’ marketplace has been a primary driver for the explosion in the size, frequency, and severity of cyber-attacks. The same can be said for the proliferation of business models established to sell stolen data and make cybercrime pay.– Raj Samani, CTO for Intel Security EMEA
A Look into Enterprise Cybersecurity: Curing the Ignorance - Infopulse - 675340

In March 2015, an independent cybersecurity consultant Marc Goodman hosted an interactive panel called “Future Crimes from the Digital Underworld” at SXSW 2015. According to Goodman’s forecasts, things are getting pretty serious . The danger continues to grow with every minute. As more and more devices become connected to the Internet, our living environment becomes completely hackable. According to Intel’s Internet of Things, we will have 200 billion internet-connected devices by 2020, resulting in 26 smart objects per capita worldwide. “Today all these computers are hackable, which means that the 21st century modern world, that we’re building, is a digital house of cards that can come crashing down at any moment. We need to protect it because right now we don’t have a backup plan”, says Goodman.

What most of us don’t quite understand is that we are in the first seconds of the first minutes of the first hours of the internet revolution, and there’s tremendous change coming in this century. It’s high-time for a Manhattan Project for Cyber Security.– Marc Goodman, Future Crimes Institute

With the expanding digitalization of our world, risks for business continue to grow as well. Lots of companies remain unprotected. Experience shows that an exposed system is constantly scanned by potential attackers a couple dozen times a day. Advanced hacking attempts might reach up to five times a week. Thus, an unprotected system is vulnerable to an imminent cyber-attack. The main factor that determines the chances of the corporate data being hacked is a lack of a security system, which is aimed at protecting a specific business application. On the positive side, awareness and attention to cybersecurity have risen as well. A regular security kit, obviously, is not enough. The misunderstanding of cyber threats risks served a catalyst for the risk analysis correction. Potential threats are being analyzed and the possible negative consequences are properly evaluated. Microsoft pays up to $100,000 to anyone reporting the breaches in their systems (source). The 2016 U.S. national budget includes $14 billion for cybersecurity (source). Meanwhile, ICT companies continue to increase their security budgets. In the last year, Microsoft spent $1 billion on security only (source). Sounds like a tremendous amount at first, but even such expenses might fall short, as the total estimates of annual cybercrimes’ cost might reach $450 billion per McAfee reports. Many large companies were hacked over the past years: JP Morgan Chase, Sony, Adobe, eBay, TalkTalk etc. According to the 2014 Symantec research, five out of six interviewed companies have been attacked. What matters more, none of these researches is accurate enough as many cases are not reported or are even left unnoticed.

The industry needs to organize at the same level as hackers to help defend themselves from these continuing attacks. The use of advanced analytics, sharing threat intelligence data and collaborating across the industry will help to even the playing field against attackers while helping mitigate the cost to commerce and society.– Marc van Zadelhoff, Vice President of Strategy, IBM Security

As the threat continues to grow, most corporations look for outsourced cybersecurity solutions. There are no issues with security solutions implementation: security specialists have tried-and-tested practices (risk analysis, a selection of security controls). There are ready solutions available on the IT market, which, together with organizational measures, make it possible to transform a huge problem with irreversible consequences into an unlikely risk. Still, in most cases, security systems are built from the ground up providing protection of the specific vulnerable information. Such system should include a complex of security events monitoring and penetration testing. This solution is normally an ‘eye-opener’ for business applications owners. After that, any doubts regarding a potential cyber-attack disappear completely.

Investing in data protection today is securing your business for tomorrow.

Learn more about a wide range of cybersecurity services offered by Infopulse.

Next Article

We have a solution to your needs. Just send us a message, and our experts will follow up with you asap.

Please specify your request

Thank you!

We have received your request and will contact you back soon.