If you want to stay abreast of what’s happening in custom software development
Thursday, January 24, 2013
There has been an increasing number of cybercrimes over the past three years – particularly in espionage and cyber hacking. According to the Ponemon Institute*, an American organisation that conducts research on data protection and security, cybercrime has more than doubled over the last three years and the financial impact of these attacks has increased by almost 40%. In Australia alone, it is estimated by Symantec that cybercrime has cost Australians $1.65 billion in 2011. In the Norton Cybercrime Report 2012**, Symantec reported that cybercriminals were increasingly setting their sights on mobile platforms.
Although large enterprises, hosting providers and even government departments have been the victim of cyber-attacks over the past year, as often documented in the press, many targets have been small and medium-sized enterprises. The cyber-attacks carried against small and medium-sized enterprises have usually been the theft of financial data such as credit card details. With simple security measures in place, 90% of these crimes could have been prevented. However, it is taking many organisations up to seven months to detect a breach of their system.
On the overall scheme of things, financial crime has actually fallen in comparison to cyber hacking and espionage which have increased over the past year. Such crimes are usually carried out against large enterprises. Login credentials were a particularly commonly targeted vulnerability where 74% of cyber-attacks have targeted remote access entry points. With the increasing popularity of the BYOD (bring-your-own-device) initiative where employers are permitting their employees to use their own devices at work to access company data, what measures can an organisation take to ensure that if they offer employees the ability to access company data remotely, that these entry points are secure?
According to Craig Moore, Solentive Software’s Lead Architect, the rapid development and adaptation of mobile computing platforms, from laptops to tablets and smart devices is placing increased pressure on organisations, both big and small, to support remote computing if they want to stay competitive in an increasingly tight market.
“A large portion of companies who have fallen victim to cybercrime are usually running legacy remote access frameworks designed to manage corporate devices such as SOE (standard operating environment) laptops and old smartphone models. These devices are not equipped to manage today’s remote access needs and cannot be adapted. The use of these devices has led to increased exposure of corporate infrastructure and digital assets as access points are opened around the existing infrastructure to support short term needs,” explained Moore.
“Remote access is quickly taking precedence over the provision and maintenance of adequate security in the rush to keep up with efficiency demands. However, performing the two does not have to result in large scale expenditure. Rather, they can be achieved by taking the time to understand the remote access needs of the business,” continued Moore.
The following should be taken into account when developing a viable security solution that satisfies the core needs of the business:
However, Moore points out that the most important point is to educate your users.
“Do not assume that they will follow your policies just because you sent them an email to say that they have to. It is important to help them understand what you need them to do in simple terms and why. Any breach in security or cyber-attack is almost always initiated by the action of a user,” concluded Moore.
* Rawlinson, K; & Doss, M., HP Research: Cybercrime Costs Rise Nearly 40 Percent, Attack Frequency Doubles, October 2012 – (Hewlett-Packard)
** 2012 Norton Study: Consumer Cybercrime Estimated at $110 Billion Annually, September 2012 – (Symantec)
Number of views (459)
UNSW Medicine cross platform mobile app
UNSW Global partners with Solentive
Foxtel selects Solentive
Phone: 1300 55 30 50
Or fill in the form on our contact page