Cybercrime Today: Protect Data from Cybercriminals

This is part 2 of a series leading up to Cybersecurity Awareness Month in October, and we’ll follow up with blogs each week next month on general trends affecting cybersecurity.

Cybercrime

Today, government organizations and businesses face an unprecedented array of threats to the information systems that constitute the backbone of global commercial and civil society. These new Trojans, malware, micro-bots, targeted spam, phishing and other risks are not only appearing in greater numbers, they are also constantly evolving in complexity at a rate. This makes devising and implementing effective countermeasures increasingly difficult. The sources of these threats range from nation-states seeking commercial, political, and military advantage, to criminal syndicates that recruit highly talented individuals who conduct constant, and often successful efforts to break into the systems of organizations large and small. One method involves innovative business models created as a result of botnets – collections of compromised computers that become zombies and carry out the commands of cyber scammers. Furthermore, they are applying new software-as-a-service trends to their underground operations with the likes of “Botnets-As-A-Service” and “Malware-As-A-Service”.

Whether conducted by nation states or criminals, cybercrime trends are shifting toward a “for profit” motive and away from the nuisance and notoriety that characterized earlier digital vandalism and mischief. Verizon’s 2010 Data Breach Report, notes that 70% of data breaches resulted from external agents. At the same time, a lot data loss (48%) and risk is self-inflicted via human error, carelessness and disgruntled employees. Any effective cybersecurity environment must protect against both malicious external and internal intent as well as normal everyday human foibles.

Dell is facing these challenges head-on by applying the defense-in-depth, layered approach as well as partnering with leading-edge security vendors such as INTEGRITY Global Security to develop highly secure, client-level solutions.

About the Author: Pam Cawthorn