The Business-Technology Weave

Jan 2 2013   1:52PM GMT

New Year, New Tricks… Old Standby: Cyber-crime

David Scott David Scott Profile: David Scott

As we enter 2013, many of us are excited by new projects, new enablements, and an expansion of systems and related capabilities.  I always feel a sunny optimism when embarking on projects, and I anticipate the deliveries and related empowerments.

But there’s a corresponding dark side for every positive pursuit, and the tech realm is not sheltered from nefarious activities:  The number of cyber-crimes grows with each passing month – we don’t have to wait for the turn of a year – and the result of bad outcomes is ever-more severe.

The beginning of the year is a nice time to focus and position ourselves in understanding some important things, so as to take effective action:  The steps that cyber-criminals use to attack networks; basic types of malware utilized; and the things you need to use and do in order to stop attacks from being successful.

As we’ll see, we have to guard against reconnaissance (nefarious entities cruising around looking for vulnerabilities and easy marks to exploit), penetration (intrusion into the network/assets), insertion of malware (with resultant theft, corruption, exploitation, etc.), and in most instances, a protection of bad-activity by hiding the exploitation as it is going on, and covering tracks once done.

Stay tuned…

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: