Companies Need to Pull Up Their Socks to Combat Cyberattacks
-
Upload
yusuph-kileo -
Category
Documents
-
view
6.013 -
download
0
description
Transcript of Companies Need to Pull Up Their Socks to Combat Cyberattacks
-
YUSUPH KILEO CYBERSECURITY AND DIGITAL FORENSICS EXPERT 1
COMPANIES NEED TO PULL UP THEIR SOCKS TO COMBAT CYBERATTACKS
Cyber-attacks are rapidly increasing across nations and organizations that
oversee sensitive information remain woefully unprepared to fend off
increasingly clever and sophisticated cyber-attacks New study has shown
Silicon Valley security software firm FireEye Inc. issued a report on Tuesday 24th Feb 2015
showing the trend of cyber-attacks. The report came when experts across nations vows to extend
the struggle to fight cybercrimes.
Data breach victims took a median of 205 days almost seven months to realize they had had
-of-the- -card data are becoming
harder to distinguish from state-sponsored attackers due to advanced camouflaging tools and
tactics.
Despite increasing awareness of cyberthreats and investments to protect sensitive data, including
personal customer information and corporate secrets, corporations appear to be falling behind in
their efforts to counter hackers. Many companies are better prepared for fires, floods and ice storms
than other emergencies, said John Proctor, vice-president of global cybersecurity with Montreal
information technology services firm CGI Group Inc.
The cyber crime statistics illustrate some of the general trendsin the field of hi-tech crimes. Marked increases in cyber crimestatistics result in an increasing need for professionals capableof responding to and investigating cyber crimes, andconducting computer forensic examinations of evidence inthese cases.
-
YUSUPH KILEO CYBERSECURITY AND DIGITAL FORENSICS EXPERT 2
TIP: Nearly 70 per cent of those hit by data breaches in 2014 found out
about the infractions from outsiders such as police or customers
At the same time, corporations increasingly realize there is little they can do to stop data raiders
from penetrating their firewalls and getting past their anti-virus software. Leading cybersecurity
providers are more focused on containing malicious software programs that have already entered
corporate servers and constantly monitoring networks to prevent the invaders from uploading data
to anonymous cybercriminals located around the world.
Data from PwC's 17th Annual Global CEO Survey
Catherine Beagan Flood, a litigation partner with Blake, Cassels & Graydon LLP in Toronto
-priority
a sense of resignat
49% of global CEO are concerned about CYBERTHREATSto their organisation
53% are concerned about the effect of bribery and corruption on their bussiness.
43% are concerned about inability to protect intellectual property
-
YUSUPH KILEO CYBERSECURITY AND DIGITAL FORENSICS EXPERT 3
TIP: Almost every hack attack investigated by FireEye subsidiary
required only a user name and password to remotely access corporate severs
and not an extra authentication tool, such as random code sent to a
secondary device like a smartphones, biometric, tokens etc. that can give
added protection.
Last year, high-profile hack attacks on Home Depot, JPMorgan and Sony Pictures, among others,
compromised tens of millions of customer accounts and led to the leak of confidential information,
such as credit-card data and embarrassing internal e-mails.
According to cybersecurity firm Risk Based Security, five of the biggest 10 hacks ever happened
in 2014, while 1.1 billion records were compromised in 3,014 data breach incidents around the
world, up from the previous record of 822 million
amount of known breaches; experts say that data breaches remain underreported, and legislation
now before the Canadian Parliament would make data-breach reporting mandatory.
TIP: Many organizations are vulnerable to mistakes by their own people.
-mails messages meant to weakest
recipients into sharing passwords and log in information to access protected
servers ormation
technology (IT) department or suppliers of anti-virus software in 2014,
almost double the level of the previous year.
IT professionals are also falling short in how they build protective layers around their stores of
gaps allowing hackers to enter and roam freely around their systems.