11.07.2015 Views

The power of ten - enterpriseinnovation.net

The power of ten - enterpriseinnovation.net

The power of ten - enterpriseinnovation.net

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BACKPAGE ROBERT CLARKHow to avoid being a cyber victimRobert Clark analyzes the changing economics <strong>of</strong> stolen dataIthey licensed out their brand to other gangs. To protect its value,they would severely punish any franchisee who made a threatand failed to carry it out.over the past two decades—exposes the corporatized naturesays the unprecedented scale <strong>of</strong> looting in the Soviet collapseprovided the foundation for today’s global criminal operations.<strong>The</strong> barely-regulated communities <strong>of</strong> cyberspace are an irresistiblehoneypot for well funded gangs.Organized cybercrimewere exposed or stolen last year, and <strong>of</strong> those thefts, 91% werelinked to organized crime groups.Stolen credit card data that was worthUS$16 in 2007 is now worth just 50 centsdata <strong>net</strong>works. Enterprise IT organizations and their superiorsknow this. Presumably they have all deployed the perimeterward <strong>of</strong>f—or at least be alerted to—malicious attacks.Yet, according to Verizon Business’ 2009 Data Breach Inves-69% <strong>of</strong> breaches were discovered by a third party. <strong>The</strong> reportis based on the experiences <strong>of</strong> Verizon’s own customer base in“<strong>The</strong> majority <strong>of</strong> breaches still occur because basic controlswere not in place or because those that were present were notconsis<strong>ten</strong>tly implemented across the organization,” the reportstates. “In the more successful breaches, the attacker exploitedsome mistake committed by the victim, hacked into the <strong>net</strong>work,records breached included at least one <strong>of</strong> these attributes.”Targeted breachesare looking for: the 17% <strong>of</strong> attacks deemed to be “highly dif-other business, criminals must seek higher value-added product—stolencredit card data that was worth as much as US$16in 2007 is now worth just 50 cents.<strong>The</strong> big money now is in stealing PINs and associated ac-businesses. Finance ranked third in 2007, but last year 93% <strong>of</strong><strong>The</strong> nearest other sector was food and beverage, the target <strong>of</strong>just 14% <strong>of</strong> successful attacks.One part <strong>of</strong> the problem is that users have become used to<strong>of</strong> global pr<strong>of</strong>essional services for Verizon Business. “Peopleused to be extremely wary about using a credit card online,” hesaid. “Now they’re very trusting.”This underlines the fact that so much <strong>of</strong> personal and businessactivity has gone online, which means enterprises becomeexposed to partners and suppliers.it has concluded that data breaches are not primarily insidebreaches, and only on 11% <strong>of</strong> these were they acting alone.Watch your partnersPartners such as suppliers, contractors and customers accountedfor 32% <strong>of</strong> all thefts. In most cases, it was lax securityby the partner that enabled the attacks.Yet partners are overshadowed by external threats—criminalgangs and hackers—representing 74% <strong>of</strong> all thefts and 94% <strong>of</strong> theactual volume <strong>of</strong> stolen records (a total <strong>of</strong>over 100% due to overlap). <strong>The</strong> real threatis from well-resourced teams <strong>of</strong> criminals valuable corporate and private data.ple<strong>of</strong> suggestions from Verizon’s Riskteam stand out. One is to not just adopta security policy, but to actually enforceit. <strong>The</strong> other is “Achieve essential, thenworry about excellent”: don’t focus onjust a few areas and leave other areasless protected.tricspeech.com50 Computerworld Hong Kong Sept 2009 www.cw.com.hk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!