There is something that the National Protection and Programs Directorate (NPPD) and the Department of Homeland Security (DHS), including the Microsoft itself know about the next cyber super weapon. Who could have thought that the solution to our cyber troubles comes on high fashion heels?
For what is worth, the growing number of female IT security experts is supposed to save the day. We are more than likely to expect an unprecedented demand for the new cyber security experts, especially the ones who prefer both top fashion and security codes. We have one more proof of our claims.
Microsoft has launched one of the biggest new talent program in India, with the special focus on young IT women. As a result, in the upcoming years Microsoft expects to build an army of one million IT ladies. No wonder, both the NPPD and the DHS share this enthusiasm for the new IT lady wave.
On the other side, we just cannot help ourselves wondering what could be the motivation for these unorthodox plans? It seems that women have some kind of a special cyber power, we are not quite aware about. Do not forget, one beautiful woman gave birth to the very first Trojan in our history.
The UK National Child Abuse Image Database (CAID) is good to go. We can only say, finally someone has done his homework as it should. All of this time we were bitterly surprised to witness all over again how we try to fight untraditional menaces with the traditional means. It is supposed to be simple.
Fight the cyber disease with the cyber cure. This can be quite an educational story. Right? Can you imagine all cyber security experts working as one team? Can you imagine more of these databases with enough crime categories? How hard could it be? You can rest assured that the criminals play a different game.
Their favorite brand is definitely the United Colors of Benetton, for a good and obvious reason. We can learn from them. You can save the world with a single database. However, you can certainly change with the quite a few crimes related databases. The crime grows where it feels safe and strong enough.
The cyberspace should not be allowed to become or be one of these crime-friendly spaces. Yes, you can type and upload against the crime. The cyber warriors for a noble cause can make a difference. Our hats off to the UK cyber wizards, who are protecting the children in both real and virtual playgrounds.
The Americas Information Security Leadership Awards has announced its winners for the fourth time. The great thing about is that the American in its title does not refer only to the North America, but also to the Central and South America. So, when you say the American Award it includes both continents.
This is exactly what we need. We need something traditional, encouraging and inspirational at the same time. On the other hand, this something should include the word international in its title. As long as we have American or European prefixes, we cannot expect a major improvement in this field.
For what is worth, we are appreciating and we are grateful for these types of rare IT security awards. We just wish for more of these awards with the wider scope. The hackers themselves seem to be less nationalistic oriented and more open to the idea of an international cooperation. We should follow.
This is how we should do it. A little bit of awarding here and there. Then, a little bit of bug bounty programs, as well. If we appreciate enough our efforts and time invested for the IT security, then we can be rewarded with something more valuable that the awards themselves. The fully functional IT Security, for a change.
How many times we have to repeat it? How many evidences we have to submit in order to convince you? About what exactly? Our main point is quite a simple one, and apparently extremely difficult to accept. The human factor is the worst cyber menace you have ever witnessed and heard about.
In the absolute and surprising majority of cases you can easily ensure the remarkable level of the proper IT security. How? With the regular updates and use of patched systems. Yet, we keep missing to update and continue to use the unpatched systems. Why? Either we are totally reckless or lazy.
Either way we are in trouble. On the other hand, your friendly neighbor hacker only needs one vulnerability to pay an unexpected and unforgettable visit. We could have easily avoided or at least decreased the chances of facing this cyber trouble. All what we needed to do was to invest a little bit of our time.
No one can make you to comply with these simple and effective IT security rules, but also there is no one you can complain once you get hurt. The cyber doctors have given you a fair warning including a vaccine. It is your fault, if you think that you have something else more important to do.
You do not have to be a rocket scientist to know that former employees should not have the access to the company’s IT infrastructure as once they used to do. Yet, you would be surprised to find out in how many cases we forget to lock the IT door after someone leaves a company this way or another.
Why? It seems that we worry much more about the contract, social security, cancellation period, and all other more important issues that IT security in these cases seems like a trivial thing. We do not have time to clean the cyber working space after our former colleagues, but we do not forget the other things.
Believe it or not, there is a higher probability that your former employee will “hack” your company than any hacker you can possibly think of on this planet. The worst thing about it is that we leave an open door. Any unauthorized access is potentially extremely dangerous for your company or business.
This includes cases, when your former employee feels nostalgic about his old company’s account or wants to do you harm because he was fired. It only takes a couple of minutes to change passwords and adjust new security settings. Yet, we miss to act accordingly. This is how our former employee becomes our future hacker.
Why do we need top IT security for our business? So, that the IT experts can earn more. Why do we hesitate to implement these adequate cyber security measures? Because, they are expensive. Because, they are time consuming. Because, we do not have enough qualified staff to implement it.
Well, we have heard so many excuses that we learned them by heart. On the other hand, there is one piece of statistical information that will make you think twice about these ridiculous excuses. There is something scarier than any known malware or virus, which can be found on the Internet.
Are you ready to face the absolute horror? Here it goes. Customers, clients, users, and others, call them what you want, who have experienced a cyber trouble associated with your business are more than likely to pay a visit to your competitors. In more than 50% of all cases, this will happen sooner or later.
Are you already googling in search for the IT security consultant? If you do not want to do it for yourself, then do it for your customers. If you are not afraid of the hackers, then you should be terrified of your competitors. What a lovely way to motivate businessmen to invest in the IT security. Indeed.
It brings back the feelings of the good old days, doesn’t it? McAfee, Symantec, Fortinet, and Palo Alto Networks are the heart and bone of the Security Threat Alliance. These four riders are supposed to deliver the apocalypse to the doorstep of some of the most notorious hackers in the cyber world.
The basic premise in this case is actually quite simple and efficient at the same time. If the hackers all over the world can unite, how come we haven’t done the same already? What is keeping us from launching the United IT Security Colors of Benetton? Finally, someone has realized what needs to be done.
The real enemy is out there. The IT security players have finally figured out that there is no point fighting each other. The competitors in the IT security business are not the enemies. Hopefully, these guys can now focus their attention to fixing real problems instead of fighting each other.
The real question is, what is keeping us from making one international security threat alliance? Imagine all IT security experts acting as one. Imagine all IT security companies working on the same task. The trouble is, we need more people with proper motivation than with the unrealistic imagination.
Finally, someone has realized what is going on. You do not have to be a rocket scientist to know for sure how cyber attacks can seriously cripple your business. If you know, why do not you do something about it? This is an excellent question for the London Chamber of Commerce and Industry (LCCI).
According to its disturbing findings the so-called hacker’s taxes take £21 billion give it or take from the UK small and medium-sized enterprises (SMEs). You should also take into account that the average price for a skillful hacker’s attack in this case is somewhere between £50,000 and £100,000 per year.
So, what is wrong with this picture? You can do your best, but you cannot find the provider of the IT security services, who can charge you this much for an entire year. That is the moral of this story. Compared to the post festum damage the investment in an appropriate IT prevention is a symbolic one.
Then, how come we keep avoiding to make this very first affordable and necessary step? It is going to happen to someone else, but not me. I do not have time or resources to do it. I do not have qualified staff for these operations. It is time consuming. It is too expensive. So, what is your excuse?
You can rest assured that the cyber crime’s hand is a long one with surprisingly skillful fingers. When it comes to the modern day hackers you simply cannot exaggerate. However, this one is a little bit hard to swallow without the bitterness, even for the most pessimistic IT security pessimists.
We have completely neglected what is happening above our heads. The impressive army of weather satellites flies around carelessly and without the proper cyber defense on the ground. Yes, you heard that one correctly. Potential troubles in the sky may have solid ground origins and causes.
You may ask yourself, who in the world would try to hack the IT infrastructure of the weather satellites? And why? Better think twice. These satellites can come in handy for the spying purposes. You can do some spying and later offer your findings for a nice price. Does this one sound like a good hacker’s plan?
What can we do about it? Well, there is so much to do it. We should begin by paying some additional and absolutely necessary IT security attention in this field. You cannot control both bad weather and bad hackers, but you can certainly predict their actions. IT and weather security are all about proper predictions. Right?
There is no such a thing as a good news in the world of IT security. As soon as you hear about the latest security breach, you are only offered with a choice how many people are being affected by it. This time Godwill was honest enough to admit that almost 900,000 credit cards related data are being stolen in almost 20 countries worldwide.
So, what is going to happen now? Well, you know the drill, don’t you. They are going to say that something is stolen, but no damage is actually being done. Should we trust them? What other option do we have? They say it is going to be fixed and under no circumstances will similar things happen again in the future.
Unfortunately, some of the well-known X Files techniques are to be applied, as well. If you cannot deny, then you have to find someone else to be blamed instead of you. In this case, Godwill believes that the third party vendors are to be blamed for the whole mess. Which is not a nice thing to say, and which also may be or not be entirely true.
Can you maintain a good mood after this bad news about the Godwill? Hard to say, but you still have to play. Maybe, we should appreciate the rare good news when we hear one that a major IT security threat or vulnerability has been prevented or solved successfully. How about that for a change?