Sweat in peace, don’t bleed in war…

By Meredydd Hughes

Whether you believe it was General Patton, General Shwarzkopf or another historic figure who coined these words – the point it makes has never been more relevant than today in the world of business, as well as in the mindset of the military.

Even if the violent imagery doesn’t reflect your business leadership style, please read on, because we all need to consider how strategic neglect can lose business fast - faster than ever in fact. The same impetus that can create business value quickly from nothing can return it to dust with a speed that defies human understanding.

With the UK Government – and others around the world - already issuing advice on cyberprotection, the growth of positive business technologies is threatened. In our litigious societies, the future will need to be secure beyond current standards. Evidence already exists of state-sponsored cybercrime, in addition to individual acts or those of organised crime groups. Additionally, there is a lack of trust in governments to not misuse their necessary security access to technology, leading, I believe to a developing impasse between those who wish to develop fully secure systems and those who would need to police them.

That impasse leaves room for criminal exploitation.

The emerging “Internet of Things” has no boundaries – from health, transport, and civil communications to warfare and state infrastructure - the very scale and scope of the IoT creates a vision of radical industrial and social transformation over the next thirty years. The exponential growth is so great in just five years that it merits our full attention, and yet this will be dwarfed by the change during the following decades if the trends identified continue.

So even if you are comfortable that you evaluate your own corporate risk profile, every day the very interactivity that helps build your business opens new opportunities for criminals to bypass your security and harm your work – to make your business bleed money.

The European Cybercrime Centre (EC3), a department of Europol, has created the Internet Organised Crime Threat Assessment. Among other issues, it draws attention to the criminal threats resulting from combining Big Data with other developments. While it also outlines new defensive and intelligence gathering opportunities, it chillingly states that “Big Data together with the Internet of Everything provides cybercriminals with new attack vectors and an increased attack surface.”

In summary – the criminals are finding new ways to hurt you and yours.

It’s time to sweat – not through fear -  but with the hard work ethic you show in the gym. The crisis will come. Invest in the best IT protection you can find – and get yourself fit to face the battle with ExCyb – interactive crisis management training for strategic leaders - from the experts in managing emergencies.

more news

Secure Working From Home During Coronavirus

In the wake of the coronavirus, many organisations internationally are allowing people to work from home to lessen the risk of contagion, but is this wise from a cybersecurity point of view? While companies generally have a cybersecurity policy in place that governs the use of anti-virus and firewall protection, individuals without any tech knowledge could fall foul of cybercriminals.

read more

Crypto Miners, Targeted Ransomware Dominate the Threat Landscape

Twenty-eight per cent of all organisations worldwide were impacted by malicious multi-purpose botnets and targeted ransomware attacks rose by 20% according to Check Point Research, the Threat Intelligence and Research arm of Check Point Software.

read more

Kaspersky's Top 7 Mobile Security Threats in 2020

Mobile device security threats are on the rise. In 2014, Kaspersky detected almost 3.5 million pieces of malware on more than 1 million user devices.

read more

SEC Releases Guide To Combat Cybersecurity Threats

The Securities and Exchange Commission has released a guide to best practices to combat cybersecurity infractions, data loss and privacy breaches.

read more