top of page

Time To Be Cyber Secure

TUIVNN

20-Dec-20

The increasing volume and sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information. The average unprotected computer (i.e. does not have proper security controls in place) connected to the Internet can be compromised in moments.

How is one vulnerable without cyber security? Why is it of vital importance?
The increasing volume and sophistication of cyber security threats–including targeting phishing scams, data theft, and other online vulnerabilities–demand that we remain vigilant about securing our systems and information. The average unprotected computer (i.e. does not have proper security controls in place) connected to the Internet can be compromised in moments. Thousands of infected web pages are being discovered every day. Hundreds of millions of records have been involved in data breaches. New attack methods are launched continuously. These are just a few examples of the threats facing us, and they highlight the importance of information security as a necessary approach to protecting data and systems.

What can be the impact of a security breach?
Corporations are increasingly exposed to cyber thieves and are the victims of corporate espionage (also known as the Insider Threat) caused by both internal and external security breaches. Fraudsters can be extremely capable of exploiting enterprise weaknesses and corporate defenses to steal intellectual property (IP), compromise corporate strategy, target customers, and pilfer or manipulate confidential and regulated information. Security breaches can cause end user downtime. Reactive recovery measures can impact IT productivity and ability to deliver essential business service. You can lose significant amount of staff hours. Intellectual Property or Customer/Client information can be lost.

What should be done to ensure the safety of the data?
Executives need to commit to improving information security if they are to achieve the intended benefits and demonstrate the value of their investment. Businesses must take a proactive approach to tackling cyber security rather than waiting for a breach to occur and then acting on it.

What are the new ways of modern cyber warfare?
Today, the cyber economy is the economy. And I don’t mean the dot coms. I meanvirtually every vital service -- water supply, transportation, energy, banking and finance,telecommunications, public health. All of these rely upon computers and the fiber-opticlines, switches and routers that connect them, corrupt those networks and you disrupt thenation. It is a paradox of our times: the very technology that makes our economy sodynamic and our military forces so dominating - also makes us more vulnerable. Some new ways of modern cyber warfare are vandalism, propaganda, network attacks against infrastructure and non-network attacks against infrastructure.

How is the cyber security job market expanding and who are the major players in it?
Today, an experienced Cyber Security Expert is the highest paid professional in this IT security field. Cyber Security Experts are an integral part of Information Security, Incident Response and Fraud Control departments. These departments are present in most eCommerce companies, banks, insurance companies, IT companies,Government agencies, etc.

bottom of page