Wednesday, April 16, 2014

The Paschal eggs of cybersecurity

The tradition of giving Paschal eggs in Easter is related to fertility which is what spring represents.In some countries decorated chicken eggs are exchanged, in others it is more typical to give chocolate eggs to your beloved people.
Perhaps information security professionals could take example and arrange their own tradition in order to celebrate that they work in a fertile and growing professional field. In fact, their level of satisfaction about their jobs soared last year, as is reflected on the study, “Information Security: from business barrier to business enabler” commissioned by Infosecurity Europe. 81% of cybersecurity professionals surveyedsaid that their job has become more enjoyable, although there is still a significant gap of qualified talent in this field.
The exponential growth in demand for professionals related to information security exacerbates the lack of competent people to address the wide range of cyber risks that threaten users, businesses and governments. For example, U.S. Pentagon plans to increase its cybersecurity workforce from ​​1,800 people this year to 6,000 in 2016.
The role played by security experts is essential in organizations. A well prepared team could eventually prevent security breaches that allow hackers to gain sensitive information or customer’s personal data, as it happened to hardware manufacturer Lacie. The company has informed its online store’s customers that it was infected with a malware through which an attacker could have obtained their personal and bank details for a whole year.
Speaking of end users, there is still a long way to go in ​​security, especially in everything related to mobile devices. Earlier this year, Samsung took everyone’s attention when it announced that a fingerprint reader would be implemented on its recently launched Samsung Galaxy S5. However, the security firm SRLabs has demonstrated that its reliability is questionable, since it is possible to bypass the reader with a silicone sheet of the owner’s footprint.
Google is also aware of the need to protect end users who can’t invest so much resources as an organization does. Therefore, it has been implemented a system for scanning apps prior to their installation on Android in order to look for malware.
Another threat looming on the owners of mobile phones is the potential physical theft of the device. To prevent thieves from accessing information stored on a device or make use of it, manufacturers and operators have come to the commitment to include anti-theft tools on every phone by July 2015. Such tools will allow a user to remotely erase personal information or render the smartphone inoperable.
All that said, we wish you a happy Easter. Disconnect and have fun, but remember to use technology carefully, cybercriminals don’t go on vacation.
We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links.


Post a Comment