HP predicts catastrophic cyber attack by 2020
Hewlett Packard expects an attack that will cause significant and lasting damage to a major world economy through physical and economic impacts. HP also predicts enormous challenges around creating a robust single digital online identity and managing the security of information shared online through social media, in the cloud and through devices connected to the internet of things.
“All these things are all about sharing data, not about security. Securing all the data shared in this way is a huge challenge in the absence of any standards to enable us to take control.
Another significant challenge in the next five years, will be ensuring that regulatory and privacy concerns are addressed without limiting cross-border trade or exposing industry to financial risk.
Cyber security areas to tackle
HP believes there are three areas that need to be tackled urgently.
Focus more time and effort on understanding our adversaries and how to disrupt them at every step.
Understand and identify our risk so that we can see how best to protect as well as enable our information assets.
Collaborate more and share information with each other to get a single view of the threats and extend our cyber security capabilities beyond our own organisations.”
Security challenges in 2015
Looking at the year ahead, HP expect a major mobile exploit in the next 10 to 12 months as adversaries continue to collaborate faster and more efficiently, unencumbered with regulations. We need to understand our information environments better, see how they work and find better ways of making them secure.
Other challenges in 2015 include the need to improve the management of open-source software within organisations and to address security vulnerabilities within supply chains. From the attack on US retailer Target through a compromised air-conditioning supplier, it is clear to see that organisations need to change the way they deal with suppliers.
A third key area in the year ahead will be industry sector attacks such as those already seen in the retail and healthcare sectors.
In all these scenarios, tackling the security challenges around data and users will be key.
These are clear signposts to what needs to be done and that it will be essential to find an alternative to password-based authentication and focus more on protecting data.
Yellowspring offer a Cyber Security audit service to identify potential areas of risk to sensitive data and the work required to achieve the CE standards. We also provide guidance and assistance to implement technology and process controls to remedy gaps identified and to establish best data security practices.
In addition we can also help you work towards other information security standards such ISO27001 and IASME. If you would like more information please contact Maria West on Tel: 01268 494160 or email firstname.lastname@example.org