The Threat Against Bad Cyber Security Increases

If last year was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyses large and diverse piles of data to help companies identify emerging cyber-threat trends. “2017 will be the year of increasingly creative [hacks],” he said. In the past, cybersecurity was considered the realm of IT departments, Meyer explained, but no longer. As smart companies systematically integrate security into their systems, the culture hackers too will evolve.

“Cybercriminals follow the money trail,” Meyer said, and smart companies should adopt proactive policies. Ransomware attacks grew quickly, he said, because the attacks are “cheap to operate, and many organizations are not yet applying the proper analysis and decision-making to appropriately defend against this threat.”

“It’s equally cheap to identify internal vulnerability to hacks and to apply preventative best practices, Meyer said. But for many companies it’s not as easy to understand the cybersecurity threats most likely to impact business. To help, TechRepublic spoke with a number of prominent security experts about their predictions for near-future cybersecurity trends likely to impact enterprise and small business in 2017.”

In reality the threat of compromised cyber security has become our planet’s new weapon of mass destruction. The documentary Zero Days (below) explores the growing concern that the disintegration of online safety has set the stage for potential physical dangers as well. “Our entire power supply can be cut off,” a foreboding voice informs us near the opening of the film. “Our systems can be taken over. Hospitals deprived of power would cease to function. It’s not if, it’s when.”

The title of the film refers to the often-times debilitating vulnerabilities that can be exploited by the seasoned hacker. As outlined in the documentary, the phenomenon of the hacker rose to prominence in the 1980’s, as generally innocuous computer nerds made mischief by implanted malware on unsuspecting victims. But what began as little more than a minor annoyance has grown considerably more sophisticated and destructive over the intervening years as these hackers have found a profitable niche in which to employ their considerable skills.

Hackers now have the capacity to snatch the personal information of countless millions throughout the globe. They can cripple infrastructure, inspire suspicion between government agencies, and incite hysteria among the masses. They can steal thousands of credit card numbers during a busy holiday season, or manipulate the controls of a nuclear power plant.

The world’s top technological wizards are working around the clock to devise powerful firewalls and encryption, but the threat continues to evolve. These merchants of cyber menace offer their services to the highest bidders. While they exist underground, their employers can be the most public of entities. Governments have been known to utilize the services of hackers in their attempts to gain intelligence or inflict damage on neighbouring countries.

There is no easy fix to this crisis. Zero Days paints a frightening portrait of a cyber world that is growing far too large and expanding too rapidly to contain. “The bottom line is we are putting so much vulnerable, hackable, connected technology into so many places that this makes us prone to the willpower of any potential adversary or foe,” says interview subject and computer security activist Joshua Corman. An impending cyber war will certainly find nourishment from our reliance on the very systems deployed to attack us.



Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s