<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Share the Infinigate UK Blog on LinkedIn Share the Infinigate UK Blog on Twitter Share the Infinigate UK Blog on Facebook Share the Infinigate UK Blog on Google+ Share the Infinigate UK Blog via Email

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

Posted: 14 March 2018

IT Creepy Clown Five Things Keep Me Up At Night

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information security from time-to-time. As such, you probably get approached to opine on a summary of what frightens you the most, and how to drive to sum navigable preventative steps.

Having said that, I’m certain I live my life in fear of many things, but there are a few items which clearly have my attention and they are as follows:

Concern #1: Attacks which kill

Cyber-attacks will one day lead to the loss of life through nefarious ways to attack people individually. Yes, this concept has been conjectured for years through demonstrations of the ability to attack all sorts of ‘things,’ from pacemakers to trains, to automobiles and now aircraft systems. It appears to me that the course of a cyber-attack leading to the loss of life is irrevocable and the question is only a matter of when and not if.

Concern #2: Apathy and numbness in security decision-making

Ironically, even though press about attacks and awareness is at an all-time high, it appears that a certain degree of lethargy has set in with regard to a ‘sense of urgency’ in doing the ‘right’ thing – – as many find the pursuit, in the end, fruitless. I fear that the numerous business executives are abandoning the mental exploration of how to secure endpoints and other points more effectively and have succumbed to the idea that they will either one day be a victim or have already joined victimhood.

Concern #3: More Critical Infrastructure Outages

It’s not hard to see how one of the world’s most advanced countries will experience widespread cyber-attack disruptions to critical infrastructure services such as the following:

  • Power Generation
  • Water Supply
  • Cell, Telephone or Television (Cable) Delivery Services
  • Police or First-Responder Networks

Concern #4: Comeuppance of Cyber-Hostage Taking

There has been a long history of cyber-ransom activity, however 2014 broke new ground with nefarious groups taking hostage digital assets or services until certain demands are met, which might not be in financial forms. In at least one case this has led to business failure.

Concern #5: Cyber Attack laws begin to be adopted en mass – including nationalistic-rules

Faced with an ever increasing dissatisfied and frustrated constituency and state-sponsored espionage, governments will begin the process of setting laws on cyber-attacks and begin to dictate network traffic flows, security levels at critical infrastructure companies, acceptable data processing domiciles, and providing rules on what constitutes acceptable internet behavior.

Just like creepy clowns that haunt the dreams of many children (and sometimes adults), there are numerous cyber threats lurking around every corner, waiting for the opportune moment to strike. Are you prepared?

(This post originally appeared on the offical Radware Blog)

Top 9 DDoS Threats your Organisation must be prepared for IoT Botnet Attack

Carl Herberger Vice President, Security Solutions, Radware
Posted by: Carl Herberger
Vice President, Security Solutions, Radware

 

Share via:

    

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts