By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics in dropshipping
    Predictive Analytics Helps New Dropshipping Businesses Thrive
    12 Min Read
    data-driven approach in healthcare
    The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
    6 Min Read
    analytics for tax compliance
    Analytics Changes the Calculus of Business Tax Compliance
    8 Min Read
    big data analytics in gaming
    The Role of Big Data Analytics in Gaming
    10 Min Read
    analyst,women,looking,at,kpi,data,on,computer,screen
    Promising Benefits of Predictive Analytics in Asset Management
    11 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Ants, Padlocks, and Cyber Security
Share
Notification Show More
Latest News
ai digital marketing tools
Top Five AI-Driven Digital Marketing Tools in 2023
Artificial Intelligence
ai-generated content
Is AI-Generated Content a Net Positive for Businesses?
Artificial Intelligence
predictive analytics in dropshipping
Predictive Analytics Helps New Dropshipping Businesses Thrive
Predictive Analytics
cloud data security in 2023
Top Tools for Your Cloud Data Security Stack in 2023
Cloud Computing
become a data scientist
Boosting Your Chances for Landing a Job as a Data Scientist
Jobs
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Analytics > Ants, Padlocks, and Cyber Security
AnalyticsBig Data

Ants, Padlocks, and Cyber Security

BillFranks
Last updated: 2015/09/10 at 1:23 PM
BillFranks
9 Min Read
SHARE

If you’ve followed the news recently, I don’t need to tell you that cyber security is a topic of major importance today. It seems that every week there is another revelation of a security breach at an organization thought by many to be a leader in data and network security. The breaches span governmental agencies and virtually every industry.

Contents
Padlocks & Lock PicksEver Had Ants Get Into Your House?The Lack of LocalityDon’t Be Too Quick To Judge

If you’ve followed the news recently, I don’t need to tell you that cyber security is a topic of major importance today. It seems that every week there is another revelation of a security breach at an organization thought by many to be a leader in data and network security. The breaches span governmental agencies and virtually every industry. Ironically, even a company that makes its money selling security hacks to governments and other organizations was itself hacked and its secret hacking code made public!

What is leading to this seeming deluge of security breaches? Are the breached organizations simply falling down on the job? I would argue that it isn’t that simple. In fact, there are several factors that make securing networks and data today an incredibly difficult task.

Padlocks & Lock Picks

Consider for a moment the physical door locks that are employed around the world on every house, building, or car. Over the centuries, increasingly complex locks have been created. Instead of the simple keys from the past, we now have very complex, machine milled keys for our doors. Often, there is an electronic passcode as well. With all the improvement in lock technology over the years, we’ve certainly eliminated all car thefts, home break-ins, and industrial theft, right? Of course not! The fact is that as soon as a new lock is created, the bad guys go to work figuring out how to break into the lock.

More Read

predictive analytics in dropshipping

Predictive Analytics Helps New Dropshipping Businesses Thrive

Utilizing Data to Discover Shortcomings Within Your Business Model
Small Businesses Use Big Data to Offset Risk During Economic Uncertainty
The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
Analytics Changes the Calculus of Business Tax Compliance

You can go on the internet and easily see how to bypass common door locks. You can also purchase skeleton keys that will open a broad array of standard locks. The fact is that your front door is secure against a huge percentage of the population, including most bad guys. However, for those that are sophisticated and really want to get into your house, they can find a way. The same is true in the cyber world. Even with all the safety features placed on networks and data systems today, there are always weaknesses and gaps that someone will find and exploit. Even banks, with all of their sophisticated security protocols, still have branches robbed today.

Ever Had Ants Get Into Your House?

Something I recently discussed with ZDNet is how most homes invariably will have a few ants and assorted other bugs inside. No matter how well we seal our homes and keep them clean, some ants find a way in. This is because an ant only needs an incredibly small crack or hole to make its way into your house. You may find the crack that the ants got in today and seal it. But, another crack will form soon enough. It is a constant battle to keep a home free of ants and bugs because new pathways into the home are constantly appearing as foundations settle, siding ages, and time takes its toll.

Cyber security is a similarly never ending endeavor. Even a network secured to the highest standards available will have cracks appear. These cracks can be an outdated operating system on an employee’s computer, phishing emails that an employee accidentally clicks on, or a malfunctioning router. At any point, another small vulnerability can appear and you can bet there are bad guys looking for those cracks all the time just as ants are constantly probing to find a way into your home. Without a concerted effort to find the cracks before someone else does or, at minimum, seal a crack as soon as someone exploits it, networks cannot be secure.

The Lack of Locality

I was recently speaking with Jordan Lynn, an Australian journalist with Insurance Business, on the topic of cyber security and one of the most interesting topics of our conversation dealt with the unique nature of cyber break-ins versus traditional break-ins. Historically, it was necessary to physically show up at a car, house, or building in order to break into it and then physically carry out the loot. This created two extra safety nets compared to cyber security. First, since bad guys had to physically visit a property to attack it, the number of attacks any given person or team could execute was limited. Second, by being physically local to the crime scene, numerous chances to catch the crooks in the act are created and physical evidence can be left behind. There is a lot of risk for a crook during a physical break-in.

Unfortunately, when it comes to cyber security the concept of locality does not apply. A hacker can sit half a world away and attack a system through a path that is well masked and hidden. Even if the authorities can eventually figure out the source of the attack, those involved will be long gone from the scene. Not only do cyber criminals avoid the risks of locality, but they can also perpetrate many attacks simultaneously. This leads to the perfect storm of high volume, hard to trace attacks from a global pool of cyber criminals.

Don’t Be Too Quick To Judge

While I do believe that many organizations lack sufficient security around sensitive data, I also believe that many are truly attempting to implement the highest security standards available today. But even the most diligent organizations won’t be able to stop every single breach attempt given the sophistication of the criminals at work today. Does that mean we need to despair and throw our hands up in defeat? No.

What must happen is that organizations must recognize the fluid nature of network and data security gaps and put in place sufficient resources to combat it. This includes becoming proactive in identifying risks and not just reacting to those already identified and/or exploited. It also means compartmentalizing certain sensitive information to the maximum extent possible and to actively monitor any interaction that occurs with that information. This approach would be analogous to adding video monitoring and motion detection to your home in addition to traditional locks. There has even been experimentation with offering cash awards to “good hackers” who identify and reveal new security gaps without exploiting them or passing them on to others.

Make sure that your organization isn’t underestimating the nature of the battle going on with cyber security. At the same time, don’t assume that any organization with a data breach is guilty of being careless and sloppy. The fact is that a battle is continuously raging to defeat network security protocols. You wouldn’t blame your neighbors who padlocked their doors if a criminal found a way to defeat the padlock and gain entry to their home. Similarly, there are cases where organizations did what would be reasonably expected but came up against a criminal with the right tools and enough motivation to gain access anyway.

Originally published by the International Institute for Analytics

BillFranks September 10, 2015
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
By BillFranks
Follow:
Bill Franks is Chief Analytics Officer for The International Institute For Analytics (IIA). Franks is also the author of Taming The Big Data Tidal Wave and The Analytics Revolution. His work has spanned clients in a variety of industries for companies ranging in size from Fortune 100 companies to small non-profit organizations. You can learn more at http://www.bill-franks.com.

Follow us on Facebook

Latest News

ai digital marketing tools
Top Five AI-Driven Digital Marketing Tools in 2023
Artificial Intelligence
ai-generated content
Is AI-Generated Content a Net Positive for Businesses?
Artificial Intelligence
predictive analytics in dropshipping
Predictive Analytics Helps New Dropshipping Businesses Thrive
Predictive Analytics
cloud data security in 2023
Top Tools for Your Cloud Data Security Stack in 2023
Cloud Computing

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

You Might also Like

predictive analytics in dropshipping
Predictive Analytics

Predictive Analytics Helps New Dropshipping Businesses Thrive

12 Min Read
utlizing big data for business model
Big Data

Utilizing Data to Discover Shortcomings Within Your Business Model

6 Min Read
big data use in small businesses
Big Data

Small Businesses Use Big Data to Offset Risk During Economic Uncertainty

7 Min Read
data-driven approach in healthcare
Analytics

The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?