Cybersecurity Hacks That Should Have Taught Us a Lesson

March 4, 2016 | Views: 3934

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Observing and taking note of a cybercrime method doesn’t always equate to taking proactive actions against it. While this might sound like companies and organizations simply aren’t paying attention, it has more to do with their belief that their existing protection against cybercrime is enough to avoid a breach.

There are some attacks that stand out and even with high level alerts, seem to remain on the ‘inactive list’ for attracting additional security measures.

Car hacking has been stepped up to the point that it’s now being taken more seriously. From police cruisers to Jeep Cherokees, researchers have shown that there are a variety of methods to take over or control vehicles. Chrysler made a recall decision to address the problems and Intel took their own steps to create a ‘Car Security Review Board.’

Apple remained a trusted organization for all of their devices, until recently. While they still retain an excellent record as compared to Android or other devices, XCodeGhost Trojan snuck into the official App Store. It demonstrated there are ways and methods to supersede the gatekeepers.

Trend Micro reported that one quarter of the data breaches occur within the healthcare industry. There are many reasons for this particular vertical to fall prey to cyberattacks. Possibly, the major one is companies/organizations in this industry often have to share on multiple platforms. Each access point is a method of vulnerability. It only takes the one out of security compliance to be the next possible victime of a cyberattack.

Backup, backup, backup. Companies are now being encouraged to maintain at least three separate backups that are varied in timing. Ransomware is not only growing, but has become much more sophisticated recently. The cybercriminals have gone to the extent of designing their approach from a business model standard. There’s no expectation that ransomware will go away and the only protection is in maintaining multiple backups.

Remaining alert to potential breaches from inside sources is another repeated topic. While companies prefer the path of trusting their employees, they need to remain attentive to the potential of cybercrime through monitoring and reviews. This priority cannot be overstated. Many of breaches often occur inside the company environment.

“Reinforcement of the key elements of cybersecurity should be a main focus of any organization. As professionals in the industry, we maintain the knowledge base for the various areas that are vulnerable to a cyberattack and work closely with clients to educate, update and advise so that they can take steps against a breach.”


Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Good article.

  2. Great oped and in my research at least with corporate board members charged as “gatekeepers” and overseers of the big picture. I think it’s still tuned to black & white tube thinking and outta focus when the corporate boards agendas lack ethical & hacks and security as a whole to debate, fund and stay aware of. A quick look at the “corporate” General Counsels the lawyers” on these boards, academically speaking know very little of the technology secure profession which to me speaks bytes of a “linguistics as the issue in whole.” Jokingly, I say maybe we write a book in “latin” just for the board corporate counsels to at least turn a page on both matters to understand why tuning into this early will prevent consumers from applying opt-out of your brand. -jim.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 742 / December 14, 2019
How do I Get MTA Certified?
Views: 1314 / December 12, 2019
How much does your PAM software really cost?
Views: 1751 / December 10, 2019
How Do I Get into Android Development?
Views: 2141 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?