Information, the new currency under increased organised threat

New age cyber criminals targeting poorly protected IT infra

PTI | October 12, 2010



Information has become the new currency but is under greater threat than before owing to a mobile workforce, consumerisation of IT, heterogenity of enterprise IT environments and entry of criminal elements and leveraging of new mobile devices as a vectors to steal information.

"Today's attacks are proving to be more sophisticated, well-organised and covert in nature than attacks seen in years past", according to Shantanu Ghosh, Vice President, India Product Operations, Symantec.

"..New age cyber criminals are targetting four key areas of weakness that are putting business environments at risk, namely--poorly protected infrastructure,poorly protected information, poorly enforced IT policies and poorly managed systems", he said.

The threat landscape today was evolving rapidly.Until recently, attackers were looking for the fame associated with widepread attacks that brought down large parts of the internet infrastucture and grabbed headlines. Now, theft attacks have a more insidious motivation-money, he said.

Online theft and trade in confidential information, including intellectual property, customer and employee records, financial data and other sensitive informtion is now an organised industry."In 2008, 90 percent of the attacks were driven by organised criminals," he said.

"Attackers are finding new methods of profiting from confidential data, including itnellectual property", he said .

Cybercriminals were also leveraging the multitude of devices that connect to the internet, not just desktops, but also mobile devices, such as smart phones, lapstops and PDAs.

A Symantec's survey recently said the average revenue lost by Indian enterprises due to cyber attacks was Rs 58 lakh in 2009.

Indian enterprises lost an average of Rs 94 lakh in organisation, customer and employee data in 2009 and an average of Rs 84 lakh in productivity. Sixtysix percent of the Indian enterprises said they had experienced cyber attacks.The attacks also led to loss of brand reputation, customer trust and high litigation cases.

In 2009, the top three reported losses were theft of itnellectual property, theft of customer credit card information or other financial information and theft of customer personally identifiable information, Ghosh said.

Some of the top Information Security challenges include proliferation of data, including documents, emails spreadsheets. Another challenge was a mobile workforce.

"Today with increasing number of mobile devices allowing employees to work from anywhere and with variety of devices including smartphones, USB drives, laptops being used to access company data, enterprises are currently struggling to identify where their confidential information is and and how it is being used", Ghosh said.

Consumerisation of IT was another huge challenge.

"The official use of consumer technology such as social networking, instant messaging and blogs has become prevalent in enterprises."

A Symantec survey revealed that 82 per cent of Indian enterprises use facebook while 54 per cent officially use web based consumer email and 62 per cent use blogs.Additionaly 46 per cent use microblogging tools, 69 per cent use Google Talk and 61 per cent use Yahoo Messenger.Social Media is constantly being used in business for collaboration and communication, leaving them open to threats, he said.

Data loss and data breaches caused by lost or stolen phone is also a big challenge, as mobile devices are now used to store confidential business information and access the corporate network.About 98 per cent of mobile phones reported lost or stolen in New Delhi in 2008-09 are yet to be traced.

Enterprise Security was also becoming diffiult due to number of factors. Enterprise security is understaffed.

Secondly, enterprises are embarking on new initiaties that make providing security more difficult.Initiatives that were most problematic from security view point were infrastrucuture-as-a service, platform as-a-service , server virtualization, endpoint virtulaization and software-as-a-service.

Smartphones were perceived as the biggest threat followed by windows-based laptops, 'PDAS' and 'mac-based laptops.'

Going forward, social engineering is expected to be the primary attack vector.

"More and more atackers are going directly after the end user and attempt to trick them into downloading malware or divulging sensitive information under the assumption that they are doing something perfectly innocent", Ghosh said.

As Mac and smartpone continue to increase in popularity in 2010, more attackers will devote time to creating malware to exploit these devices, he said.

"The need of the hour is a well-structured IT security strategy that enables enterprises protect their IT assets.

Moving forward, they need to develop a security strategy that is risk-based and policy driven, information-centric and operationalized across a well managed infrastructure", Ghosh said.
 

Comments

 

Other News

India’s real GDP projected to grow 6.5–7% in 2024-25

India’s real GDP is projected to grow 6.5–7 per cent in 2024-25. The Indian economy recovered swiftly from the pandemic, with its real GDP in FY24 being 20 per cent higher than the pre-COVID, FY20 levels. This was stated in the Economic Survey 2023-24 presented in Parliament Monday by finance m

`Women welfare & empowerment budget tripled in 10 years`

As the Indian concept of welfare transforms into empowerment, India is transitioning from women’s development to women-led development, highlights the Economic Survey 2023-2024. Tabled in the Parliament on Monday by finance minister Nirmala Sitharaman, the Economic Survey 2023-2024 fo

Mofussils: Musings from the Margins

Provincials: Postcards from the Peripheries By Sumana Roy Aleph Book Company, 320 pages, Rs 899 Sumana Roy’s latest work, like its p

How to promote local participation in knowledge sharing

Knowledge is a powerful weapon to help people and improve their lives. Knowledge provides the tools to understand society, solve problems, and empower people to overcome challenges and experience personal growth. Limited sources were available to attain information on the events in and arou

‘The Civil Servant and Super Cop: Modesty, Security and the State in Punjab’

Punjabi Centuries: Tracing Histories of Punjab Edited by Anshu Malhotra Orient BlackSwan, 404 pages, Rs. 2,150

What really happened in ‘The Scam That Shook a Nation’?

The Scam That Shook a Nation By Prakash Patra and Rasheed Kidwai HarperCollins, 276 pages, Rs 399 The 1970s were a

Visionary Talk: Amitabh Gupta, Pune Police Commissioner with Kailashnath Adhikari, MD, Governance Now


Archives

Current Issue

Opinion

Facebook Twitter Google Plus Linkedin Subscribe Newsletter

Twitter