SECURITY
STAY CYBER SAFE
To comprehend the sheer extent of current threats, antivirus business Kaspersky has created an interactive map. It depicts the number and type of cyber threats in real time.
The total number of security attacks detected increased by 48% from 2013 to 2014 and there is little evidence to suggest this percentage will decrease in 2015. Despite these figures, it appears that information security programs have actually weakened, due largely to naivety and inadequate investment.
In the industrial sector alone, companies reported a 17% increase in detected security incidents in 2014. The resulting financial costs increased by 34%, while research
38 | TOMORROW’S FM
Last year, the total number of cyber security incidents detected rose to 42.8 million according to PWC's Global State of Information Security Survey 2015. For those of you that have not done the maths, that's 117,339 attacks per day, every day.
from Barclays suggests that nearly 50% of businesses that suffer a cyber security attack cease trading.
WHODUNNIT? Interestingly, there is one thing most
security threats have in common and that is the source. The results of PWC's survey illustrate that 34.55% of companies asked, reported that the attacks on them last year were estimated to originate from current employees of the company and 30.42% from former employees. These were the two biggest culprits.
Statistically, you are far more likely to come under cyber attack because of someone plugging in a corrupted USB stick to your network, than you are to be specifically targeted by a
hacker trying to exploit a weakness in an automated system. However, that's not to say that you shouldn't prepare for both eventualities.
Hackers still ranked highly in the survey - third with 23.89% of companies surveyed pinning their security attacks on them.
The moral of the story is that to develop secure systems, companies must implement technical, conceptual and organisational measures to prevent different types of security threats.
WHERE TO START? Typical security incidents include
infection by malware, unauthorised use, manipulation of data, espionage and denial of service - the latter
twitter.com/TomorrowsFM
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70