Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Cyber Security Needs to Be Prioritized

By Frank-Jürgen Richter

May 31, 2021

The technology sector has brought hope to millions worldwide. It has generated higher incomes for many, extended several conveniences, and with the pandemic – technology allowed some sense of normalcy to prevail. But as with any innovation, there are always security loopholes that some people will try and exploit.

With the majority of countries pressing towards total digitalization, there is need to carefully guard the security of underlying systems. Many organizations—from small firms to national administrations—sometimes overlook building data security. How can cyber security be better explained and deployed?

To address such concerns, Horasis is organizing the Horasis Global Meeting on 08 June 2021. The one-day virtual event will see participation from diverse backgrounds, spanning members of governments, businesses, academia, and the media to deliberate on pressing issues and arrive at workable and sustainable solutions.

Cyberattacks Occur with Alarming Frequency

By 2017 itself, cyberattacks had become commonplace in the US, so much so that one computer was attacked every 39 seconds. Such security breaches can have far reaching implications, especially when servers of organizations and governments are hacked into. Cyberattacks, for instance, can bring an entire city to a standstill. Case in point being the SamSam ransomware attack that led to a complete network outage in the US city of Atlanta in 2018 for five days. The attackers demanded a $51,000 ransom in bitcoins. Although this might seem a paltry sum when holding an entire city “hostage”, the ensuing recovery costs were significant – totalling over $10 million. This wasn’t an isolated attack on a city’s infrastructure; Colorado’s Department of Transportation also fell victim to SamSam. 

Even large tech companies such as Facebook and Yahoo have been targets. In September 2018, Facebook reported that hackers had gained access to 50 million users accounts. And among them was even Mark Zuckerberg’s account. Yahoo, meanwhile, has suffered multiple intrusions – the most severe being in 2014. At the time, hackers made off with information related to 500 million accounts.

In UK, the National Health Service faced an attack that resulted in significant clear up costs being incurred. The WannaCry ransomware caused an estimated loss of £92 million

The Threats Will Become More Serious

Modern technological wonders offer unparalleled benefits. With the rollout of 5G networks gathering momentum, there is promise of unlocking immense potential across industries – spanning education, healthcare, logistics, and retail, among others. 5G enabled IoT devices will make light of numerous tasks that currently demand in-person engagement. Estimates suggested that by 2020 itself, there would be an estimated 200 billion connected devices in use globally. However, greater uptake in connected devices also signals a higher risk exposure to cyber threats. In fact, the very systems that are enabling automation of mundane tasks can well be used to launch an automated attack.

Data security is, therefore, a prerequisite for any individual or organization. Connected systems are here to stay and their usage has more benefits than downsides. However, the installation of defense mechanisms that thwart cyberattacks, are an absolute must.

Steps to Prevent Cyberattacks

The first component to preventing cyberattacks is to generate awareness. It must feature as an integral part of orientation or ongoing upgradation programs for both existing employees and new recruits. This way, each individual is entrusted with assuming steps that will safeguard organizational interests. Artificial intelligence powered tools such as ThreatCop can be used for employee trainings, where simulated attacks are used to explain defense mechanisms.

In addition, a phishing incident response tool like TAB, or Threat Alert Button, can help repose power in employees. TAB allows its users to detect and report any communication—such as e-mails—that may contain suspicious content. This can be an effective primary tier in pre-empting more severe attacks. In fact, 95 percent of successful security breaches occur through e-mail. The company also highlighted that by the current year, cyberattack related costs will have totaled $1 trillion.

Organizations must also conduct a vulnerability assessment and penetration test at regular intervals. It allows detecting possible weak links in ICT equipment. Furthermore, there is no substitute to keeping systems updated. Security updates and installations must be performed without fail.

Cyberattackers, ultimately, are extremely smart tech experts themselves. Failure to stay ahead of the attacker could mean setting oneself up as an easy target. One must also bear in mind that preventive cybersecurity costs are actually miniscule when compared to the enormous clear up costs. Investing in cyber security is no longer an option. It needs to be prioritized and governments and business that do so sooner are likely to be better prepared and thwart cyberattacks in the future. 

Photo Caption: Laptop and photo of a potential hacker.