ipl-logo

Why Have These Attacks Been So Effective So Far?

890 Words4 Pages

INFORMATION SECURITY TRENDS
You can’t protect everything equally; we have to find a way to control only what matters. The top trending information security are listed below;
1. Cloud security becomes a top priority for many
Who hasn’t heard about the cloud or cloud computing? Nearly 100 percentage of computer literate people all over the world knows what cloud computing is and in one way or the other understands the concepts of cloud computing. Cloud offers different services such as storage, Web Based Cloud Computing, Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS), Utility Services, Managed Services, Service Commerce. Cloud Computing is defined as the delivery of computing services—servers, …show more content…

Ransomware Attacks
Ransomware is a type of attack that usually results in restricted access to system data by data encryption. The attackers usually attempt to extort money, telling victims “pay the ransom and your data will be decrypted.” Why have these attacks been so effective so far? Cyber-criminals often impersonate courier companies and send personalized emails (Spear phishing) about an uncollected parcel whose status can be found by following an attached link. Clicking on that link initiates the encryption of data. Payment of the ransom may not always result in data decryption. Ransomware has increased by 11.5% from April 2016 to March 2017. It is very difficult to fight such attacks because they exploit weaknesses in system gaps, or human carelessness. If the data is critical and the company's future depends on it, it is worth considering data hosting with an external provider. It is the provider's responsibility to secure the data that is critical to the functioning of the business. (Wójcik, …show more content…

Traditional methods, such as the security firewall, are still the main pillars and sometimes only pillars in the information security strategy. These traditional methods have traditionally worked, but in order to be successful in the future, companies will need to develop a new mindset on data protection. This mindset is looking at data loss as preventative, and not reactive. Companies lack the methods to analyze and utilize the amount of user data that’s being generated. Through user-based analytics, management can create guidelines of normal company behavior, so when malicious activity does occur the reaction time it quicker and directly at the source. Reinforcing healthy security habits, like safe passwords and safe employee sharing of information, can help further this prevention mindset. These little steps will benefit the company in the long run. (Wójcik,

Open Document