Cyber Security Planning, Cyber Threat Analysis - Cloud Resource DFW

By Andre Robichaud

Global terrorism is on the rise and spreading, more so because of the expanding digital front. Cyber-security is big business for hacktivists and syndicates. Consequently, focus has shifted from disruption to destruction for hacktivists and cyber criminals. In 2008, we witnessed a cyber crime that was disruptive with TJX to destructive with Target in 2013.  These two eye-opening scenarios have created concerns with Executives and Board members.  Concluding that such cyber attacks will lead to shareholder reduction, additional recipients of compliance and legal action and ultimately giving them a black eye to “status quo” in the market.

Especially relevant is digitization creating an extended attack surface of new threat vectors and access points for syndicates and hacktivists.  Company-wide internal/external employees, third party vendors(Transaction), representing law firms(Intellectual property, trade secrets) all sharing data across WiFi, cloud platforms conducting business in the home, over social medias creating and widening opportunities for syndicates.   Internal employees with sensitive access present a tremendous threat without auditing, controlled environments make them a significant target.

Cyber Security and Hacktivists Techniques

In addition attackers use a variety of techniques to expose system weakness and access virtually all perimeter defense systems. There are some these vectors used, such as Network Intrusion, websites, web applications, malware (APT Advanced Persistent Threat), social engineering, spear phishing and email attacks, Trojans, zero-day exploits.

Furthermore to identify these advanced threats organizations must mitigate cyber threat through he uses of firewalls, antivirus, intrusion detection.  Almost no network goes without vulnerabilities, and as a result hackers that find their way in may be there for a very long time.   The key is to detect quickly, but the double edge sword is companies very rarely will spend the money to match the hacker’s creative abilities.  The problem that actually exists here is the gap between cyber security professionals and the executive board members.  In blog post  “Complexity and Commoditization” –  these two destructive forces play a big part in that gap.  The gap is the complexity of the solution out running the knowledge of stakeholders such as board members.

Evaluate, Re-Evaluate

Consequently in a time of war, a good field commander always evaluates his weaknesses,  cyber threats are no different, therefore, preparedness and anticipation are the keys.  Opposite of this, syndicates are doing their homework therefore threat actors will complete heavy reconnaissance and in addition, develop custom malware.  Developing a Threat intelligence strategy and sharing this strategy will help to assess and furthermore re-assess possible breaches.

Conclusion

In conclusion, cyber crime, cyber threat and cyber terrorism landscape is continuously changing and demands the assistance of Executive Stakeholders create a holistic approach to cyber security.

Free Cloud Security Report, Download it here!


[contact-form-7 404 "Not Found"]"]

AVG Internet Security Business Edition 2016

Comprehensive Protection for Your Business

Supports 100 Users $5050.99

  • Safe surfing and malware protection for employees
  • Data and privacy protection
  • Automatically updates
  • Email server and Spam protection
  • Remote management
  • Free phone support

Cyber Crime

Concepts, Methodologies, Tools and Applications

Only 1 left in stock (more on the way) $1,839.41

Three-volume reference that explores

  • computer-based crime and threats,
  • solutions and best practices from experts in software development, information security, and law.
Download CyberScrub Privacy Suite
Buy Now!
Share this entry

0 Comments

Leave a Comment