Categories: SecurityWorkspace

Worm Holes In The Broken Global Security Network

In the last year we’ve witnessed a spate of cyber attacks that have dogged businesses, governments and other organisations; a trend, which worryingly, is on the increase.

Cyber attacks present a growing threat to businesses and IT infrastructures of all sizes. What we have to admit is that it’s now obvious that these attacks are no longer the preserve of a few troubled or anarchistic individuals, but a sustained, organised and sophisticated onslaught from criminals, states and other organisations designed to wage war on business and on governments.

Be afraid

Their targets are financial institutions, corporations and state organisations. They are stealing money, but far more importantly, they’re also appropriating ideas, blueprints, plans and strategies, the lifeblood of businesses.

Organisations have been given a harsh wake-up call with the appearance of a particularly nasty piece of rogue software – a ‘worm’ called Stuxnet that burrows into PCs and through there onto IT networks. It hides very successfully and causes huge damage to network processes and management. A new variant, Duqu has also been identified. These types of ‘malware’ are termed Advanced Persistent Threats (APTs) because they are difficult to find and cause damage over a long period.

According to the recent ‘Global Network Security’ survey by PricewaterhouseCoopers, only 16 percent of companies are prepared for APTs.

As well as showing us that the instances of cyber attack are on the increase, the recent rash of high profile breaches also show us that the current global security system is simply unable to cope with these ever-evolving threats.

A problem that needs fixing

It’s clear from the number of high profile breaches that the traditional approach to security is failing to keep these rapidly evolving and increasingly sophisticated threats in check. The current security landscape is facing a perfect storm of cyber threats with an ever-increasing number of Internet enabled devices, failing governance and compliance models, and current high levels of IT complexity.

It has taken us almost 15 years to admit to the truth, but it’s clear that layered security, the security infrastructure that currently makes up the global norm isn’t working, as it simply does not provide adequate protection. It offers ‘partial compliance’, not true security and so we need to look for new ways in which to protect ourselves against the growing data security threats that are facing organisations.

Page: 1 2

adminuk

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

23 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

1 day ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

1 day ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

2 days ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

2 days ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

2 days ago