ALL >> Computers >> View Article
More Robust Security Measures Required To Tackle Increase Of New Internet Security Threats

Reports and analysis have proven that there have been a huge increase in the nature of cyber criminal activity ranging from identity theft to security breach, and the number will continue to increase if proper security measures are not taken.
What is important to note is the amount of losses has been quite substantial. Recently, About 90 percent of U.S. companies that responded to a Computer Security Institute survey said they had detected computer security breaches and 74 percent acknowledged financial losses as a result of the breaches of security.
Bradley Anstis, VP of technical strategy at M86 Security, a global provider of Secure Web Gateway solutions, says the cyber crime industry generates over $100 billion per year and organisations can no longer accept cyber crime simply as a cost to business
In the United Kingdom, the latest cybercrime cost estimates released by the Cabinet Office showed annual losses of more than $43 billion. Cybercrime is one industry that has shown double-digit growth for several consecutive years despite lingering global recession. Cybercrime has become more profit-driven, its ...
... "business model" has evolved, giving rise to new types of criminal activities and new twists on the old types.
Highly-motivated criminals are using tools that are getting easier for anyone to access and use, and this further widens the cyber crime problem. Panda Labs report that malicious software could be bought, if not freely downloaded, "to make big bucks stealing credit card numbers and other personal information."
According to PandaLab’s recent malware report, the number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, most of which were Trojans. Moreover, there was a 26 percent increase of new threats compared to the same period last year.
Trojans remain the most popular type of threat to computer systems, and now account for 70 percent of all new malware. It can be incredibly lucrative for cybercriminals to commit fraud or steal money from Internet users through the online banking channel.
Analysts have also noted a shift from Windows-based computers to other operating systems and platforms, including smart phones, tablet computers and mobile platforms in general. Smart phones and tablets increasing popularity means more and more people are carrying miniature computers with them everywhere they go and using them for more of their daily tasks including financial transactions.
An information intelligence solutions company, Detica, which collaborated on the British government report with the Office of Cyber Security and Information Assurance in the Cabinet Office, said most of the cybercrime costs were being shouldered by business. The report also mentioned that the real impact of cybercrime was likely to be much greater than that estimated
Meanwhile, according to Antis, “Since 2007, the security market has grown 41%, and this is compared to cyber crime that has conservatively grown 376%. “Ideally, security researchers are able to plug gaps before they are used for attacks, but this does not always happen; look at the problem with zero-day vulnerabilities. Security researchers have to use every tool in their arsenal against cyber criminals.” said Antis
More awareness of security issues and incidents only demands on organizations to secure its information security environment. These report findings clearly indicates that data breaches are very common these days. One way to mitigate information security risks is with technical security training. EC-Council’s brand new TakeDownCon is a technical information security conference series, in addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world’s most comprehensive ethical hacking training program.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals and certified more than 38,000 security professionals. These certifications are recognized worldwide and have received endorsements from various government agencies including the US federal government, National Security Agency (NSA), Committee and National Security Systems (CNSS), US Army, FBI, Microsoft and CERTs (Computer Emergency Response Team) of various nations. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.
Add Comment
Computers Articles
1. How App Developers Near Me Turn Ideas Into Market Ready Apps?Author: davidjohansen
2. Monetization Strategies Recommended By App Developers Near Me
Author: davidjohansen
3. Scrape Grocery Data From Whole Foods Market Usa
Author: FoodDataScrape
4. Transform Your Shopping Experience With Grocery Delivery Apps In Usa
Author: Swiza Joy
5. Best Place To Buy Godex G500u Barcode Printer In Hyderabad
Author: prime poskart
6. How Student Retention Software Transforms Higher Education Outcomes
Author: Brenda Joyce
7. Scrape Uk Supermarket Prices Data From Tesco & Asda
Author: FoodDataScrape
8. Best Pos Cash Drawers In India
Author: prime pos
9. Full List Of Fixing Epson®️ Printer Won't Connect To Wifi Issue Usa
Author: Adam Smith
10. Web Scraping Grocery Price Comparison Data From Uk
Author: FoodDataScrape
11. How To Erase Junk Data From Your Pc?
Author: Daniel Reed
12. Scrape Weekly Restaurant Menus From Doordash Australia
Author: FoodDataScrape
13. How Rp326 Thermal Printers Boost Efficiency
Author: prime poskart
14. Understanding Agile Methodology: A Simple Guide
Author: Tech Point
15. The Complete Guide To Legacy System Migration: Why It's Time To Modernize
Author: Tech Gazebos