It seems we still don’t get it that the data we have on our networks is valuable to others.
We don’t understand the scale of data theft or the scale of the recipients of the stolen information.
I bumped in to a guy the other day. Let’s call him Bob. He ran IT Security for a large mining equipment manufacturer named after a leaf munching worm.He told me he was not a target for hackers.
“They only target banks and credit card info… don’t they?”
I asked him if he had any IT security worries.
“Well I am worried the CEO will lose his laptop when he is travelling”
“Really? Where does he go to?”
“China. He has to go there to close down counterfeiting factories.”
“What? Factories making big mining trucks like yours?”
“Down to serial numbers, paint, and of course our brand name. They export them around the world to unsuspecting firms who think we made them.”
“Has your boss got the blueprints on his laptop?”
“No, of course not! They are held only on our core systems.”
“So how do you think they got the blueprints Bob?”
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem