As A Cyber Armageddon Looms on the Horizon, Are Organizations & Individuals Equipped To Navigate the Cyberworld Minefield?
A Profile of Data Theft |
It is evident that the defenders are losing ground to the attackers. Nearly 80 percent of technology executives said that they cannot keep up with the increasing sophistication of attackers.
Large institutions lack the facts and processes to make effective decisions about cybersecurity. Larger expenditures have not translated into an increased maturity, and many institutions appear to be merely throwing money at the problem without making much progress.
Controls required to protect against cyberattacks are already having a negative business impact. Security concerns are delaying mobile functionality in enterprises by an average of six months—and are dramatically limiting the extent to which many companies are using public-cloud services. For nearly three-quarters of companies, security controls reduce frontline productivity by slowing employees’ ability to share information.
In the case of individuals who have invested considerably in digital estates & properties and have moved a good bit of their data on to the cloud, this account from a tech. journalist about how his digital life was taken over and destroyed by hackers should tell you a fair bit about the dangers one runs even if one is reasonably tech-savvy. The detailed article can be read here.
In addition to secure sites and second-factor authentications, complex passwords, generated by a variety of apps available for the purpose are at times not deemed foolproof security. Considerable work is going on in the matter of replacing passwords, and the options range from biometrics to USB devices to photos and even heartbeats. Check out this article to learn more about the current status of password alternatives.
There is also a vigorous debate on about the onus of protecting and removing personal information before sharing data about cyberthreats. Representatives from the financial and energy sectors in the U.S.A., for example, have affirmed that they are capable of protecting personal information available in their databases. This is important, since the personal information contained in Internet records is some of the most sensitive out there. It can reflect the political organizations people belong to, what they read, where they go, what they study and worship among other things. It can't be left to the whims of companies, who hold this information, whether to share this data or not.
The other growing menace faced by sites regularly accessed by hundreds of thousands of users are DDoS attacks which effectively take the site out of commission and make it inaccessible, at times for several hours. A DDoS attack can be described as throwing the kitchen sink to plug a relatively small hole and as the diagram here will show, doesn't need a great degree of sophistication or specialized hardware and software. The increasing frequency of such attacks can be gauged from the digital attack map visible by following the link in the post below.
Adoption of many of the measures, outlined earlier, are no longer an option for most organizations and agencies dealing with large databases and sensitive data. Likewise, for individuals, getting on to the internet without adequate layers of protection is like getting on to a minefield without a detector. As digital properties and estates become all pervasive and clouds, both public and private, increasingly become the repositories of huge databases and datasets, lax cybersecurity could lead to major catastrophes. In any case, recovery and disaster management processes, no matter how good the cybersecurity, should be in place.
Comments
Post a Comment
Comment moderation is enabled so comments may take some time before showing up.