Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber security – learning from the past

by The Gurus
January 13, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

While the rate of cyber attacks is certainly on the increase, has the nature of the breaches changed? The answer to the question lies in the different types of breaches and attacks that occurred in 2014.
 
2014: The year of sophistication
While the types of attacks, for example distributed denial of service (DDoS) attacks, which seek to disrupt systems and services by crashing an organisation’s website, have not changed, the sophistication of the hackers and their techniques have developed.
 
These attackers evolve quicker than cyber security, finding new and more cunning techniques to get what they want. They have also devised new evasion tactics, such as polymorphic techniques that generate attacks that do not look the same, thereby bypassing detection systems.
 
Last year also saw a number of instances of hacktivism, which is essentially akin to civil disobedience in cyber space; why hold up a banner that can be seen by hundreds, when you can deface a website that could be seen by millions? The motivations of hacktivists include political issues, promoting free speech or supporting human rights. Although, it could be argued that these ‘hacktivists’ seldom have politically motivated reasons for staging such attacks.
 
The most recent event – the leaking of communications between actors and producers, studio executives, confidential data and private documents, as well as posting five movies on file sharing sites, is believed to be a reaction to the movie The Interview about a plot to assassinate North Korea’s leader, though the real attack vector and motivation for the Sony hack may never become clear.
 
Hackers also posted numerous screenplays online and ultimately succeeded in the delayed airing of the controversial comedy. Given that Sony has endured some 15 high profile breaches, could this lead to the creation of a new verb? When a major organisation becomes the victim of a cyber attack, will the commentary say they have been “Sony’d”?
 
The final type of attacker can be found inside the organisation and can be malicious or accidental. In the latter case, employees are often the weakest link of the cyber security chain and need to be properly educated in terms of usage, access, passwords and patching and apply technology security solutions to enforce these business policies. This is particularly important given trends like BYOD and Shadow IT.
 
Basics of cyber defence
Despite the evolution of hackers, cyber criminals and their tactics, the constraints and challenges that organisations face in terms of security remain the same. IT departments face the challenge of the so-called Iron Triangle; time, cost, quality and often have to try to balance all three. In addition, the basic tenets of cyber security also are unchanged. IT teams are required to anticipate and monitor issues before they impact business, and then manage them as they emerge in order to limit their impact.
 
As a result, organisations need to implement and deploy the right procedures and response strategy. These plans and tactics are not just the responsibility of the IT security team; instead, buy-in and support is required throughout the company, especially at board level.
 
This strategy may differ depending on the business and the information that is secured, but there are five key elements that should be included. These include fast breach identification; contained and isolated localisation of issues; rapid and automated
resolution; constant productivity with no loss of user hours; and full incident lifecycle visibility to support impact analysis and the inevitable regulatory reporting.
 
One of the key aspects of any strategy is the presence of actionable intelligence to guide its continued effectiveness. This can be gathered externally or post attack effectively learning from past breaches.
 
2014 will be known for the year that hacking got serious and took centre stage on a global level. Going forward, threats and cyber criminals will continue to evolve and get better at beating defences and it is up to IT security teams, as well as the board, to learn from past breaches and attacks and tailor their defence strategy while keeping the basics strong.
 
 
John Green is business and technology development director at Accumuli

FacebookTweetLinkedIn
ShareTweet
Previous Post

Android users below Jelly Bean will not see security updates for WebView

Next Post

US Military Central Command social channels hacked

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information