Serious conversations on cyber security are happening in board rooms across the world with many corporate leaders believing they have a strategy in place for dealing with an attack. Yet, conflictingly, further down the chain of command, those at the operational level are not so sure they have enough resources to be secure. How can we forget the last big systems breach when a large American corporation became the target of a foreign government – how humiliating!!
John Stewart, Cisco Chief Security and Trust Officer explains on Bloomberg how the modality of attacks has changed, increasing by a whopping 250% from last year. There is now a greater emphasis on targeting the user. Previously it was a volume play from one site. Some attacks failed but if one was successful, the hackers considered themselves effective. However, now we have two or three attacks from hundreds of different domains. A dramatic change in strategy by the hackers.
What has really helped those trying to exploit weaknesses in our computer systems and networks is that formerly we had a separation between personal and business devices. However, now with BYOD, the lines have morphed and CIO’s are more concerned about malware from private devices getting access to business networks.
Here at CompTIA, we are striving to make cyberspace a safer and more productive place. Security concerns associated with cloud computing and BYOD are covered in our Security+ exam. While more advanced IT security topics are included in CASP (CompTIA Advanced Security Practitioner). IT education and certification are critical in the ongoing battle against the hackers.
Copyright 2015 John McGlinchey. All Rights Reserved.