Telling the truth about SME life today

How firms can fight hackers and how data regulation could help

In todays threat landscape, more needs to be done to protect data. Cybercriminals can misuse data obtained through through extortion, identity theft or gaining access to networks using social engineering tactics in multiple ways as they seek to monetise their efforts.. While many of these attacks from last year happened to systems that were not secured correctly, others were the result of skilled, determined attackers.

According to Fujitsus recent 2016 predictions, we can expect cyber-criminals to target industries that hold vast amounts of data on individuals such as the legal, education and telecommunication sectors this year. It is clear more needs to be done when protecting data within an organisation.

So what now?

Leaders need to realise that at some point their firms will become a victim of a data breach or hack. To combat this, there are several things that businesses have to do. Firstly, businesses can share threat intelligence with other companies in the same industry. This doesnt mean sharing intimate details of a companys security ecosystem, but instead sharing insight on how threats have been able to get into the business and how to defend from them. The UK government CiSP initiative is suitable for businesses to start sharing or leveraging threat intelligence.

In addition to this, organisations need to be prepared to spot, react and defend against a breach quickly, by having a threat monitoring/detection or SIEM service in place to correlate multiple log sources. This should always be partnered with an effective incident response programme.

Data breach: How to react in the crucial first 24 hours

Finally, businesses should consider security education as part of a companys overall training schedule, ensuring that the whole organisation is engaged and part of the overall cyber resilience. Each employee has their part to play in keeping assets safe so it is vital that security training and empowerment occurs from the top down.

With the frequency of data breaches growing by the second, it’s clear that no organisation can ignore the cyber threat we are facing. Its essential that organisations implement an effective security education programme alongside a strong threat intelligence system to combat todays cyber hackers.

From the CIA developed Logic Bomb to 15 year-old Michael Calce who earned the name of MafiaBoy, here are history’s biggest attacks done with nothing more than a keyboard and the internet.

Paul McEvatt is senior cyber threat intelligence manager in UK & Ireland at Fujitsu.



Related Stories

More From

Most Read


If you enjoyed this article,
why not join our newsletter?

We promise only quality content, tailored to suit what our readers like to see!