Cyber warfare is real, is here, and America is losing. Military personnel, law enforcement, and private security use bulletproof vests to protect themselves in hostile zones. These vests minimize injury and provide a means of security and safety of life. Additionally, they use intensive training, mindfulness, and combat skills to defend successfully against an enemy. This combination enables them to be effective in combat. Make no mistake, the Internet is a hostile zone and in a state of cyber warfare. Being compliant is simply the bulletproof vest, and needs a cybersecurity program to provide the training, visibility, and techniques to combat cyber threats.
Link to the full article here
“Luck is what happens when preparation meets opportunity” -Seneca.
The count-down for when you will be hacked is always running!
Breaches and Hacks are two different concepts in cybersecurity with the latter being more difficult to manage than the former. Breaches can be mitigated through security policies enforced by security awareness training, asset inventory, hardware and software configuration best practices, and various security tools/technologies. A breach, mostly associated with accidental spill of sensitive data, is best exploited by lack of internal processes, procedures, and training. Thus, breaches result in more executive terminations than hacks do because many of them are preventable.
Read the full article here
Glenn Schulke (IoT expert, writer of IoT: A Tidal Wave of Trouble) recently shared with us what hackers could be able to do once cities reach a connected society. We thought of many petty pranks such as:
- Requesting your smart fridge to order 20 jars of pickles
- Adjusting the smart fridge temperature to 60 degrees Fahrenheit (spoiled food)
- Changing the smart thermostat every five minutes (higher electricity bill)
- Turning off the hot water heater from 5:30AM to 8:30AM (cold showers)
- Scheduling a time to turn the smart lights on and off at 3AM every night (haunted house)
It reminded us of haunted houses. Once you are out of a haunted house you can separate the scary events from reality and move on with your life. While many of the petty pranks above are relatively harmless, the results of hacking could be much more malicious. According to CNBC, in 2016 “cybercrime cost the global economy over $450 billion, over 2 billion personal records were stolen and in the U.S. alone over 100 million Americans had their medical records stolen.” The results of these cybersecurity breaches are horrifying and heart-breaking to those businesses and individuals affected. With IoT, this reality is coming to fruition, fast. However, business owners can protect themselves by taking necessary precautions with cybersecurity.
Read the full article here