MORE HACKING. WHEN WILL IT STOP?
Legacy signals
Legacy popularity: 1,399 legacy views
The simple answer? It won’t. To paraphrase Willie Sutton, bank robber, “That’s where the money is.”
PBS, Sony, Lockheed, Amazon, IMF, US Senate, etc., all announced in 2011 that their systems were hacked. Security specialists are now calling 2011 the year of the hacker. Weak SecureID tokens, malware, password attacks, etc., have all been used. Foreign governments, terrorists and a “hacking collective” called LulzSec have been accused. Recently, the DOD announced that cyber attacks can now be regarded as a military attack with the recourse being military ordnance.
So who is at fault? Well, there is enough finger pointing to go around.
• Software developers: Security has never been a key conce
when releasing new operating systems and applications. Just look at all the holes in Microsoft Windows and even after all the patches, security is still a very real concern. And a Ponemon Institute, Dec. 2010 report states that cloud computing providers do not view security as one of their most important responsibilities. How can this be?
- Silicon chip manufacturers: More security needs to be done to protect the back doors into microprocessors – the brains of a computer.
- IT Specialists: They have been burdening users with so many barriers to try to protect the data that they actually wind up making their systems less secure. Fact: People always circumvent security for convenience. Companies have been known to turn their back on sloppy security if it means higher short term profits.
- Companies: As with most things, it is all to easy to believe that a hack “will never happen to me.” Another commonly heard excuse for poor security practices is, “The cost of security is too high and no ROI can be tied to it.” Or this little gem: “I’m too small of a business for anyone to target.” Remember denial is not a river in Egypt.
- Users: Sadly most of the security breaches are due to sheer carelessness. Sloppy passwords & password management, clicking on email attachments, storing data in insecure places (think yellow sticky note in an unlocked drawer), not encrypting data, etc. In fact, InfoWorld writer Ted Sampson reports in the case of the Lockheed hack, that end-user ignorance was the critical security issue.
So what is a company to do? Well, we know that the hackers are not going away, so start improving your defenses.
Here are 5 key areas where you can make immediate improvements in your online security.
1. Train your employees on security. Make them part of the solution and not part of the problem. Make security personal to them by ensuring that they understand that if your company is hit with a massive lawsuit because of sloppy employee password security, that their livelihood is very much on the line. Without proper security there is no company; no company means no jobs; and no jobs means no pay check.
2. Add security technologies. Besides anti-virus and firewalls, be sure that company computers have attachment blockers, multi-factor password authentication, automatic data storage encryption, etc.
3. Keep all software up to date. Even if you’re a small business, this is important because the software developers broadcast their own weaknesses when they release patches. For example, Microsoft of necessity will tell the world what their latest patch fixes, so cyber-criminals know what to target on those computers that don’t update.
4. Before security is deployed think about the experience from your users perspective. Security that is not used is no security at all. You need to be sure that your employees will actually understand the need for the security and that they will USE it. If not, your company can be in danger.
5. Set up Google alerts. Follow a few security groups just to keep abreast of the latest threats. Ignorance is not a defense!
Most business hackers are interested in getting the most information at the least amount of effort. So by placing enough barriers and road blocks, cyber-criminals will move on and target weaker companies. Online security needs to be made a key focus of every business.
Article author
About the Author
Access Smart is dedicated to empowering businesses and consumers to securely regain control over their digital information. Access Smart offers unique, high-quality, integrated hardware and software packages that securely manage important data over wired and wireless networks, computers, Point-of-Sale devices, kiosks, and any other device that can accept and communicate via smartcard technology.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece