Australian Govlink Issue 2 2017 | Page 42

40 IT

CYBER SECURITY

The Soft Underbelly

David Napper , Senior risk advisor Barringtons Corporate Risk
Criminal wrong doing has been around for as long as human kind has been keeping records and the motivation behind gaining an advantage from wrong doing remains the same now as if did back then . A popular saying in the nineties was that a man with a brief case could steal more than a man with a gun , this related to how corporate fraud reaped a greater financial reward ( for less risk ), than a threatening act involving a fire arm to induce a victim to part with cash . That adage still rings true today with a man with a brief case still able to steal more than a man with a gun , however now a man with a computer can steal more than a man with a brief case – but with vigilance and training this does not have to be the case for your business .
Cyber dependence amongst the community is growing twice as fast as other consumer demands and a poor cyber security approach by a business will no doubt erode confidence in their reputation and even their ability to function . A flow on from this cyber dependence is the growth of digital assets being held by an organisation and the impact that any disruption to these digital assets can create .
Asset protection is at the forefront of any organisation ’ s endeavour to protect what is important to them and this is observed with the deployment of guards , controlled access , CCTV and even chaining pens to the service counters as protection . Ironically , these same organisations then either withhold finances or overlook protecting their digital assets and that is surely to their detriment .
CYBER-THREATS
Cyber-threats are evolving and adoption of the term cyber-threat will no doubt , also evolve to encompass new techniques designed to disrupt an organisation . In 2017 , common cyber-threats include occurrences such as Distributed Denial of Service ( DDoS ), website defacement , website impersonation , corporate espionage , electronic payment interception , social media hijacking , disruption of services with a view to extort ( Ransomware ), theft of data , unauthorised system control and other less publicised cybercrimes such as click through fraud , radicalisation , romance scams and the eliciting of improper behaviour from an individual that is captured over webcam and then used to extort money from the victim . This list is ever-expanding and this article is not able to cover all forms of attack , but will touch on the commonly experienced cyber disruptions .
GOVLINK » ISSUE 2 2017