The definition of Cybersecurity is broad, just like its universe. Cybersecurity encompasses a whole range of media and technologies that aim to protect computers, programs, networks and data from any unlawful damages and intrusions, as well as user behaviors and attitudes, and which in some way condition information security. And as the world increases its interconnection, more people share the responsibility to ensure the security of Cyberspace.
With the ever-increasing number of existing electronic devices (Internet of Things) and its users, as well as online business and networked information, cyberspace security has become a serious concern for people, businesses, governments, and nations, directly interfering with trust in systems, which is fundamental to the acceptance of technological developments.
For companies, more than just a simple IT problem, cybersecurity is even a business risk. Information security is a very sensitive issue that forces new processes in companies, derived from the new General Data Protection Regulation.
Cyber-attacks and Cyberpiracy
With the addition of users and the information contained in the network, and with the change of the business sphere and the administration of systems to the online world, with the triggering of machine learning and artificial intelligence, daily risks and threats in this medium appear, with the proliferation of methods of attack to the computerized systems.
Cyber-attacks are often seen in financial and administrative services (banks, communication networks, energy, air traffic, state agencies, health organizations, among many others) and Cyberpirates often are associated with industrial espionage. In any case, there is a very large heterogeneity in the profile of the attackers, ranging from non-expert young people driven by curiosity (often with dire consequences) to organized crime.
The most well-known cyber-attacks are malware (including ransomware), scareware’s, botnets, denial-of-service (DoS) attacks, and attacks on social networks. An absent-minded person, in a routine gesture, can open an infected file (it is always necessary to think before clicking).
Movies (“Die Hard 4.0”, for example) and the popular television series (such as “Mr. Robot” and “Black Mirror”) talk about what the near future of the world will be like, with the chaos generated by cyberattacks provoked by cyber-terrorists.
The new threats in Cyberspace
In addition to the traditional dangers of data theft, extortion, blackmail, and vandalism, cyberhackers move to more rapid sands, such as espionage, misinformation, market manipulation, and infrastructure disruption.
The threat is real, leading governments and companies to invest in research and the attainment of new information security technologies, in the production of norms and regulations, without neglecting education.
Malware, for example, can simply “sit” quietly within a network, and then its access is sold to the largest bidder in underground networks. Such RAT (remote access trojan) malware poses a huge challenge for cybersecurity professionals as it is designed not to be detected by nature. Often this type of software is not developed for this purpose, it is simply taken advantage of in an unforeseen way, taking advantage of incomplete or poorly performed specifications (in an ideal context).
In this perspective, cybersecurity takes on a different relevance, because one can consider part of the business model itself around the technologies. In this dimension, in particular, the importance of standardization and regulation is evident.
Did you know?
- On average, 1 computer is hacked every 39 seconds. (*)
- 1 in 3 Americans fell victim to a computer virus, hacking or another cyber attack in 2016. (*)
- Young adults (18 – 24 years) are the main victims of cyber attacks. (*)
- 59% of Asian organizations suffer a security breach interrupting their business at least once a month. (**)
Cybersecurity: what’s next? What can be done?
It is already taken for granted: data center architectures and traditional infrastructure and operations practices are not enough to respond to the digital transformation and the needs of today’s digital businesses.
Technological innovation comes faster than most organizations can keep up with. Before one innovation is implemented, two more have arrived.
The technology has to support complex applications in systems scattered across multiple locations, from data centers to the cloud and to hosting providers.
Businesses need an approach that integrates cybersecurity into every aspect of the organization, from the IT department to the training of employees for security policies. Cybersecurity should be approached as an entire business structure, which covers areas from the business context to security policies and standards.
In short, cybersecurity is not only the responsibility of the “IT crowd”, or just the business. It’s all about teamwork. The development of a safe cyberspace requires the participation of all: companies, governments, and even consumers.
7 Important quotes on Cybersecurity
Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain. Kevin Mitnick
Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email? James Scott
Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge. Bruce Schneier
I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image. Stephen Hawking
If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Bruce Schneier
My message for companies that think they haven’t been attacked is: “You’re not looking hard enough”. James Snook
In the very near future, cyber security exercises are going to be absolutely expected of all companies by regulators. Michael Vatis
Cybersecurity in CCG
In CCG, cybersecurity is already a great concern and a priority. It is being developed in the domain of applied research EPMQ, by researcher Henrique Santos, with Ana Lima as development coordinator.
The CCG organizes the event Cybersecurity: risks, opportunities and compliance, at the end of the European Cybersecurity Month.