Monday, March 31, 2014

Daily run for cybersecurity

Without wasting a minute, we put on our sneakers, put the mobile’s headphones in our ears and start jogging while we review the latest news about cybersecurity.

While we feel the morning air brushes against our face, we learn that the Ecuador’s President, Rafael Correa, Twitter account was hacked for a few minutes. The attackers posted some tweets linking to alleged official emails and documents.
After some initial steps, we learn that a Russian hacktivist group managed to breach the Chinese Embassy in Moscow and steal some documents. These files would prove that Russian aluminum giant Rusal acquired Chinese equipment containing backdoors which afterwards was provided to Ukrainian telecoms and security company Altron, thus facilitating Russian espionage on Ukraine.
The first drop of sweat is sliding along our face, but we still have some issues to deal with. For example, thedifferent forms of fraud that cybercriminals use to make money at the expense of the U.S. tax system. On the one hand, filing fraudulent returns on behalf of other citizens, or even dead people. On the other hand, stealing identities, using social networks to obtain personal information or taking advantage the launch of a new IRS (government agency responsible for tax collection in the U.S.) mobile app.
¡We hear the beating of our feet again and again on the sidewalk while remembering a series of security steps that we can follow to prevent a data theft in our company: moving from simple passwords to strong authentication, taking advantage of the improved convenience of a mobile “tap-in” strong authentication model, using a layered IT security strategy that ensures appropriate risk mitigation levels, replacing magstripe payment cards with more secure card technology at the point sale.
We start to feel the fatigue of the race, but we are still far from collapse. Nonetheless risk of collapse is something that servers around the world have to deal with when they become a target of a Distributed Denial of Service (DDoS) attack. Such threats are becoming more sophisticated and much more common.According to the “DDOS Threat Landscape” report by the security firm Incapsula, almost 1 out of 3 DDoS attacks is above 20 Gbps.
At last we are approaching home. Before stepping into the shower we check with horror that the computer we left on before leaving is not working anymore. It smells like burnt. We make a quick mental review of the documents we had stored there. We lost all the year’s monthly reports, among many other things! At this point, accept our advice and celebrate today the World Backup Day by backing your irreplaceable documents up. You never know what can happen!
We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links

0 comments:

Post a Comment