As cybercrime becomes a more persistent threat, researchers and government officials are urging vigilance and collaboration.
Jun 02nd, 2014
Anyone monitoring the news over the past year could attest to the growing persistence and severity of cybercrime. However, some might still be surprised that the U.S. Director of National Intelligence has placed the threat at the top of the list for national security dangers.
All hands on deck
Help Net Security reported that a recent study co-sponsored by PricewaterhouseCoopers, CSO magazine, the CERT Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service revealed that companies are ill-prepared to combat evolving and increasing cyberattacks. The report offered the following statistics about the frequency of these incidents:
"Cybercriminals evolve their tactics very rapidly, and the repercussions of cybercrime are overwhelming for any single organization to combat alone. It's imperative that private and public organizations collaborate to combat cybercrime and gain intelligence about security threats and how to respond to them. A united response will prove to be an indispensable tool in advancing the state of cybersecurity," said David Burg, PwC's Global and U.S. Advisory Cybersecurity Leader, according to the source.
The news source added that the U.S. Director of National Intelligence identified cybercrime as a bigger national security threat than terrorism, espionage, and weapons of mass destruction
Despite the complexity and sophistication of cyberattacks, organizations can - and must - take measures to prevent their systems from being compromised. The source offered the following areas to focus on:
As one piece of a comprehensive security plan, companies can implement secure file sharing tools that are easy for employees to use and uphold best practices for encryption and other data protection measures. For example, to reduce the chance of insider threats, organizations can maintain central control over corporate resources so access can be modified if necessary, such as when a worker is leaving the business.