SAPVoice: How To Look Back To The Future Of Cybersecurity -

SAPVoice: How To Look Back To The Future Of Cybersecurity

Credit: forbes.com

  • Dec 05 2017 19:30About: 6 days ago
  • 12 views

As if to cap off an already eventful National Cybersecurity Awareness Month, -- and perhaps proving that there is no honor among thieves -- a hacker breached a forum for hackers last week, and is ransoming fellow cyber-attackers’ user data for $50,000. And there certainly seems to be plenty of occasions to increase our awareness of cybersecurity issues.

About 1.9 billion data records got exposed in the 918 that occurred in the first half of 2017 -- up 164 percent from the last half of 2016 -- according to a digital security firm’s study. The U.S. Department of Homeland Security issued a warning last week about the Bad Rabbit , which is disrupting government, hospital and other systems internationally. And cybersecurity researchers confirmed last week that an enormous botnet has already infected more than one million organizations -- and is on the verge of unleashing “the next cyber-hurricane.”

It’s crucial that we learn from these attacks. And -- just as some are using high-tech for cyberattacks -- others are using blockchain, artificial intelligence and other cutting edge technology to improve cybersecurity.

With so many cyberattacks targeting centralized services, ’s decentralized technology offers cyber-defenses from many types of attacks, according to last week. Among the benefits are blockchain’s transparency and distributed nature, which eliminate the single failure points that many hackers prey upon. But ...

“The best defense [organizations] have is the same thing that makes them such an appealing target for hackers: a mountain of data,” stated in a different story last week. “By using  algorithms and other techniques to identify data patterns, vulnerable user behaviors and predictive security trends, companies are mining and analyzing the wealth of data at their disposal to hopefully stop the next breach from happening.”

However, networks and sensors will still require cybersecurity technology, stated this month. Unsecured devices can be terrible liabilities, so organizations should earnestly evaluate the opportunities and vulnerabilities offered by AI and IoT -- and ensure that all users are well trained.

Technical savvy helps employees across the organization better understand their work environment and, as a result, operate more securely, according to last week. This will only get more important, as data analytics is increasingly crucial to business success -- and as workflow automation continues to get cheaper.

And making rules isn’t enough. For example, in healthcare, HIPAA regulations require that organizations train their workers to maintain -- and punish those who violate policies and procedures. But employee security awareness is the top healthcare data security concern for 80 percent of health IT executives, according to a 2017 healthcare security study.

“Build a among your executive and physician leaders,” Theresa Meadows, CHCIO, Senior VP and CIO of Cook Children’s Health Care System, stated last month. “Educate them about the threats, myths and importance of good cyber hygiene ... they can champion the cause among their peers and staff and get them to buy into safety processes.”

Of course, cybersecurity cultures don’t sprout up overnight.

Chief information security officers face the increasingly difficult job of convincing their c-suites that cybersecurity expenditures are worth the big bucks, according to this month. CISOs can use their organizations wealth of data to frame cybersecurity in terms that managers and executives can understand, such as managing risk, business continuity and regulatory compliance.

In short, it’s about taking a step back and learning lessons from the big picture.

“We are so overwhelmed with present security concerns that we don’t have the ability to look into the future -- or we hesitate to second guess what cybercriminals might end up doing,” stated last week. “It’s up to us to recognize what we’ve seen in the past in order to rethink our security solutions of the future.”

And last week’s hacking of the hackers’ forum -- as well as other events from this year’s National Cybersecurity Awareness Month -- have given us plenty of source material to learn from.



Follow Us on Twitter

Cybersecurity reached point where cyber-attackers hacking each other. Blockhain artificial intelligence other technologies offer ways improve cyber-defenses must also have wisdom learn from past order build best most secure future.

Related stories with SAPVoice: How To Look Back To The Future Of Cybersecurity

Paul Manafort Guilty Of Bad Password Choices -World News
Paul Manafort Guilty Of Bad Password Choices 6 days ago
It's not a crime, but the former Trump campaign manager made some very bad decisions when securing some very important accounts.
The Real Reason No One Wants Self-Driving Cars -World News
The Real Reason No One Wants Self-Driving Cars 6 days ago
Elon Musk of Tesla says self-driving cars will be safer in the aggregate. But most people don't trust the same tech companies that screw up routine updates to smartphones and expose them to ransomware with their lives. Cartoon by Ted Rall.
Enough Already With The Stupid Face ID 'Twin Test' -World News
Enough Already With The Stupid Face ID 'Twin Test' 6 days ago
Media outlets insist on "testing' the Face ID authentication on the iPhone X by seeing if identical twins can trick it, but that experiment is just a novelty that has no value for most of the world.
Millennial Budgeting App MonzoIs Morphing Into A Bank -World News
Millennial Budgeting App MonzoIs Morphing Into A Bank 6 days ago
The app that’s fast become a popular way for Brits to track their spending is inviting its users to become current account holders.
Facebook Asks Australia For Nude Pics To Test 'Revenge Porn' Defense -World News
Facebook Asks Australia For Nude Pics To Test 'Revenge Porn' Defense 6 days ago
The social media giant is taking its efforts to stem digital abuse and exposure to the next level down under.
'Pay No Attention To That Man Behind The Curtain': Technology vs. Transparency -World News
'Pay No Attention To That Man Behind The Curtain': Technology vs. Transparency 6 days ago
The only thing worse than limiting the freedom to express oneself is locking people out of the room where the public discourse is occurring.
This Russian Has The Power To Turn 100,000 Android Phones Into Cryptocurrency Miners -World News
This Russian Has The Power To Turn 100,000 Android Phones Into Cryptocurrency Miners 6 days ago
A cryptocurrency miner might have sucked up your Android phone's power thanks to this Russian's work.
Is It Possible To Benefit Society With Virtual Reality? -World News
Is It Possible To Benefit Society With Virtual Reality? 6 days ago
There are already a variety of thinkers considering how AR and VR will transform society, changing the way we age, connect with one another, and see the world.
The Upward Trend Of Software Breaches: Four Priorities For Technology Leaders In The Wake Of Equifax -World News
The Upward Trend Of Software Breaches: Four Priorities For Technology Leaders In The Wake Of Equifax 6 days ago
We must take a more proactive approach to manage software complexity if we’re ever going to reverse the trend of commonplace breaches.
SAPVoice: Banks Reinvent Customer Convenience With Virtual And Augmented Reality -World News
SAPVoice: Banks Reinvent Customer Convenience With Virtual And Augmented Reality 6 days ago
Virtual and augmented reality could turn banks into real estate brokers and customers into people who can’t wait to visit their local branch to find the property of their dreams.
FBI 'Ignores' Apple Olive Branch To Get Data From Texas Shooter iPhone -World News
FBI 'Ignores' Apple Olive Branch To Get Data From Texas Shooter iPhone 6 days ago
Apple and the FBI look set to be heading for another fight over access to the Texas murderer's iPhone.
Storage For Surveillance -World News
Storage For Surveillance 6 days ago
Our world seems less secure than in the past and governments and companies have increasing their video surveillance. The growth of surveillance has led to increased digital storage demand and focused storage products that serve these markets. Perhaps t