By Ondrej Krehel,
Back when the Internet was a baby, and I was taking my first steps in network security, hackers were a fairly homogeneous lot.
Sure, some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into popular websites to splash around some MS Paint. It was a way to rebel and earn credibility within the computer community.
By Ondrej Krehel,
You can’t opt out of real life. Yet often that’s what a lot of cyber security advice sounds like. It’s true that social networks are a hotbed for malware, hackers and spam. But staying off Facebook — for some people in certain industries — could have real-world repercussions.
Signing up for an online service, participating in an Internet auction, enrolling in a rewards program: it’s almost like playing in a casino. Which is going to lose your data tomorrow? Picking online companies we do business with is almost like placing a bet.
A massive cyber attack on American infrastructure is the 21st-century equivalent of the neutron bomb. All buildings remain standing but systems inside them are rendered useless. Human beings aren’t killed on a large scale, but few, if any, are left standing either. And while this sounds pretty dire, it’s quite likely some segment of this nation will at some time be shut down by cyber terrorists.
Intellectual property theft isn’t new. But hacker attacks on companies and governments used to be hush-hush, coming to light only years after the fact.
Now, it seems they’re making headlines on a weekly basis. This year alone we’ve read about hacker attacks on a number of governments and corporations.
Read more about cyber war , in Ondrej Krehel’s latest article “Digital Espionage in the 21st Century.” (more…)
By Matt Cullina,
The email below popped into my inbox this morning—and it was suspicious from the start.
What immediately caught my eye: a partially listed credit card number, a request to download information, and a threat that my card would be blocked if I didn’t input requested information correctly.
By Brian McGinley,
In my last post, we established a foundation of control with the first seven steps to smarter security. This is the base on which we can build sound management practices, which is what we’ll cover in Steps 8 through 14.
8. Set up a How-to Plan for Managing an Information Breach
When a breach happens it’s imperative to:
• Identify it and escalate to the appropriate management and subject matter expert resources within the organization to initiate the launch of a deliberate breach response plan.