Cybersecurity is a hot topic in the world right now, and for many good reasons. With the improvements of technology and its availability through cell phones, laptops, and tablets, everyone is vulnerable to a cyberattack. While companies all over the world are specializing in malware security and many larger companies setting up in-house cybersecurity teams, there is still the chance of hackers affecting thousands, and in some cases, millions of innocent victims’. Security is improving, but the amount of information stored on our cell phones and devices is rapidly increasing. The ability to access this data at any point leaves many unsettled and unable to trust in the technology systems designed for governments, businesses, and that of which is designed to make everyday life easier.
In a research study from the University of San Diego’s, Master of Science in Cyber Security program’s website, the article points out four cybersecurity threats we should be looking out for in 2017: Connected Cars, Smart Medical Devices and EMRs, Third Parties, and Cyber Espionage. Each of these four threats attack different peoples and can reach a new level of threat for innocent civilians, all while accessing private information in ways we didn’t think were possible. There are ways to prevent these attacks such as not ordering products with credit card information online, no online banking, no Uber, Lyft, or even Snapchat. These actions would go against the purpose of these technological advantages and reverse the progress of technology. We are clearly moving forward as cell phone applications are becoming more and more advanced. They are changing the way we travel, purchase goods, and even how we keep track of our money. With constant innovation and new breakthroughs, comes an increase in sharing of personal information and several applications store information about our banking records, social security numbers, and some are tracking our location at any given time.
People are walking cybersecurity risks, and the security companies that are put in place to protect us are having trouble keeping up. The progress the leading companies in the industry are making is too advanced and security teams need constant upgrading. Cybercrime is expected to reach $6 trillion in damage costs annually by 2021. This according to an article by Steve Morgan of CSO just last month. Looking at it from afar, the thought of the new types of technology is truly remarkable considering Microsoft is predicting that four billion people will not be online until 2020. This means that half of the population is “online”, and over half of the money in existence all over the world will be focused on repairing cybersecurity attack damages each year.
The risks associated with the advancements in technology seems to be a “one step forward, two steps back” pattern, and can make these helpful apps a hazard to criminal actions and most importantly, identity theft. The developers in charge of creating the apps have teams dedicated to cybersecurity, but they are sometimes unable to spot every cyber threat before it begins. Better technology is allowing not just the users, but hackers, to access unimaginable amounts of data that, while are extremely helpful to a user’s daily activities, are generating more power and more opportunities to breach the security systems.
Our individual devices and applications are not the only things being infiltrated by hackers and online theft programs. The problem of cybersecurity has extended to reach large corporations and entire Nation’s computer systems. Yes, entire countries are being hacked into, and even the most skilled cybersecurity wizards are having trouble stopping the viruses from spreading and eating away at the personal and confidential information of a government.
Having a car being broken into is worrisome, and having its functions taken over by a hacker is horrifying. Now think about the damage a hacker can do when breaking into government level systems. For example, hackers were able to steal information from the NSA and use a virus to sabotage a national holiday in Ukraine. According to the New York Times, a ransomware attack which started in Ukraine two weeks ago had spread throughout Europe and even reached the United States. Authorities are still speculating whether the attack was done out of political spite, but this type of news is the last thing you want to hear about when celebrating the independence of your country. The level of espionage does nothing to sooth the public’s anxiety around the safety of their personal identities and banking information while using their laptops or phones.
Corporations and Medical centers are beginning to gain attention of hackers as well. With the advancement in technology for the medical field, and the transfer from paper to cloud services, medical information is now heavily on the radar for cybercriminals. Companies private strategies and information are at risk of theft, and monitored hospitals and private lines can be seen if hackers are tapped into the companies’ servers. Hewlett Packard Enterprise Company (HPE) is one of the largest IT companies in the world and provide server, storage, networking, consulting, and support services for companies and individuals. They build the software infrastructure for companies while providing the highest level of security for each of their customers. It is companies like HPE and Cisco, a top competitor with HPE, that are working to provide the highest levels of technology, while understanding that the security behind the product is equally, if not more, important.
This week’s edition of The Score was not meant to scare but inform our readers of the abilities that cybercriminals have. Even the most cautious are susceptible to the risk of having private information leaked. Our goal is to let people know that the world is changing. Leaps in technology and its improvements have certainly made our lives easier, as we can do almost anything in the palm of our hands with cell phones. With these new high-tech tools, comes an increase in the need for responsibility. We must be aware that when we do enter information into phone apps or in websites on our computers, it may not be as private as we think. Security systems like Norton and McAfee are leading the way with security software we are able to download onto our own computers. Apple has a built-in antivirus system for all of their devices. These precautions can help from the common virus, but in the long run, none of us are completely safe and we all need to monitor where our personal information is stored.
Every IT job is a now, in part, a cybersecurity role. At MatchPoint we have filled several Cybersecurity specific positions, and can be just as much a part of the fight in protecting your company from a cyber-attack. If you or your company are in need of excellent IT Security Talent, feel free to contact us through www.matchpointcg.com or give us a call at: (484) 681-9713.