MoH Reports 3,913 Cases of COVID-19, 4,284 Recoveries in Saudi Arabia    Germany Records 189,166 COVID-19 Cases    Weather Forecast for Saturday    Dutch Driver Nyck de Vries Wins 1st Round of Diriyah Formula E-Prix 2022    Morocco to reopen airspace from Feb. 7    Okaz tops Forbes list of most visited news outlets in MENA    UAE restores flights to five African countries    Share of e-payments reaches 57% in 2021, exceeding FSDP target    8 facts you need to know about Saudi Arabia's Founding Day    A record 9 million need food assistance in northern Ethiopia    Arab Coalition: Saada prison was not targeted, facts will be provided    UNICEF providing aid for children caught up in Syria prison siege    Family who died in freezing cold by US-Canada border identified    Formula E one of key highlights in Diriyah calendar: Inzerillo    Formula E racing champions at Diriyah Gate to kick off season opener    Al-Attiyah leads after opening super special stage of Oman Rally    Crown Prince to attend 2022 Beijing Winter Olympics opening ceremony    Saudi Arabia take step closer to World Cup 2022    Arab Parliament Condemns Bombing of Baghdad Airport As Threat to Stability of Iraq    Mauritania Records 122 New Cases of Coronavirus    UK Condemns Houthi Attack on UAE    KSrelief Performs 104 Surgeries within Voluntary Medical Campaign to Combat Blindness in Chad    KSrelief Distributes 728 Winter Bags in Marib Governorate, Yemen    Stellar speaker line-up at Leap conference in Riyadh    Tata Group takes over India's loss-making national carrier    Saudi Stock Exchange Main Index Ends Trading Lower at 12,179 Points    'Orange is the New Black' actress Kathryn Kates dead at 73    RCU launches direct flights from Paris to AlUla    Saudi Stock Market Index Ends High At 12,182 Points    Public Investment Fund Launches "Savvy Gaming Group"    Diriyah E-Prix 2-Time Champion Sam Bird Sets His Sight on More Triumph in 2022 Diriyah E-Prix    Royal Commission in Yanbu Achieves Arab Award for Operation and Maintenance    Sir Elton John postpones US shows after positive Covid-19 test    Bollywood's Shilpa Shetty cleared of obscenity over Richard Gere kiss    Taylor Swift slams Damon Albarn over songwriting comments    Omani National Football Team Arrives in Jeddah to Meet Saudi National Team    Eighth Season of ABB FIA Formula E World Championship to kick off in Diriyah    Riyadh's Qualitative Events Enrich its Winter, Attract World Attention    SFDA: Fat is a Source of Energy and Its Abundance is Linked to Chronic Diseases    Reflections on celebration of Christmas    Royal Commission for AlUla to Hold Custodian of the Two Holy Mosques Endurance Cup 2022, Richard Mille AlUla Desert Polo    Saudi Arabia's Pavilion at Expo 2020 Dubai Organizes a Dance Theatrical Show for Children    Saudi Arabia rebuffs UN resolution on 'sexual orientation'    Kabir Khan eyes on joint Indian – Saudi film projects    Pilgrims Perform Dhuhr and Asr Prayers at Arafat Holy Site    Council of Senior Scholars: Muslim Brothers' Group Don't Represent Method of Islam, rather only Follows its Partisan Objectives, Violating our Graceful Religion    Eid Al-Adha Prayer Performed at the Grand Holy Mosque    Pilgrims Perform Dhuhr and Asr Prayers in Arafat Holy Site    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Become a cyber hero
Published in The Saudi Gazette on 09 - 01 - 2013


Molouk Y. Ba-Isa
Saudi Gazette
Here we are in the New Year and the struggles continue with the same old information security problems – along with a tidal wave of new ones. Some security issues will be attributed to criminal elements working for terror and destruction – along with a massive payday. Few cybercriminals are caught and prosecuted, so with deterrence lacking, online crime is increasing. It's also very easy these days to become a cybercriminal.
Social networks specializing in criminal activity are a reality and “professionals" can be paid to provide the resources for specific portions of the wrongdoing.
Unfortunately though, cybercriminals have lots of help. Many information security breaches are aided by laziness, arrogance and stupidity. People are too arrogant to install security software on their devices, thinking they are somehow immune to security issues. They are too lazy to upgrade to the latest versions of applications or install recommended security patches on operating systems. As for stupidity, take the example provided by a security manager from a Jubail industrial company. He related that the company sent a test email out to their staff that simulated a spam email with a link to a possibly malicious website. About twenty percent of the recipients of the email clicked on the link! The company started an effort to counsel those employees to control the urge to click as well as further restricted their Internet access.
Businesses need to get proactive about information security awareness because every security consultant believes that targeted attacks against companies will rise. In some instances the attacks will be industrial espionage. It costs a lot less to steal technology than to develop it and information about productivity and costs can provide profitable advantages. Criminal elements are also interested in probing for network weaknesses or monitoring networking technology use so they can be ready for future “opportunities." There is increasing concern around the security of Supervisory Control and Data Acquisition (SCADA) industrial control systems. SCADA systems are used everywhere in the Kingdom, from Saudi Arabia's water desalination units to its gas and oil operations. These systems have their own security issues and there aren't enough local experts to handle them. A new area of possible weakness in digital system security is medical technology. Unsecured wireless communication with devices from drug delivery systems to pacemakers could compromise patient safety. As of this moment, there's no instance of it occurring in reality, but a US television program showed how by hacking into a pacemaker, a massive shock of voltage could be delivered to the user, resulting in death.
For consumers, the mobile devices that everyone loves have become the favorite criminal target. The US Federal Communication Commission reported that one in three robberies in America involved the theft of a mobile phone. There are no statistics for Saudi Arabia, but reports of phone thefts everywhere from street corners to funerals confirm that people need to protect mobile devices both in the real and virtual worlds. In the past, the worst that could happen if a phone were stolen was that the number would be abused and the contacts would be lost. Now, get ready for a giant mess. People carry too much data on their handsets – both confidential personal and business data. Few people back up their devices. Many folks don't even do the basics and password-protect their handsets.
When I hear from a business acquaintance that they've lost my contact details because their phone was lost, stolen or damaged, I know this person lacks security awareness. In the future I carefully consider what to share with such an individual. There are so many computer and cloud-based backup solutions and sync applications that losing essential data is a sign that a person is either careless or massively overscheduled – and neither is a good recommendation.
Plenty of people have transferred the “click urge" from their PC to their mobile and they will click on any “like" button that appears. Last week the CEO of a company told me that I was the first person who had ever asked why he wanted to join my LinkedIn network. The link in a “like" button could lead to a malicious location, plus online communities are increasingly being used to facilitate cyber-attacks through technical or social engineering vulnerabilities. Add in mobile banking and the ignorance of many Saudi companies in allowing smartphones unfettered access to their networks and it's no surprise that criminals are so interested in gaining access to mobile devices.
The fight against cybercrime begins with information security awareness. Spend some time reading this weekend. There are good reports on the topic from Websense at http://www.websense.com/content/2013-security-predictions-report.aspx and McAfee at http://www.mcafee.com/sg/resources/reports/rp-threat-predictions-2013.pdf. Then, act on what you learn in regards to your own technology and behavior, and spread the information to anyone who will listen. The first time someone tells you that the tips you provided helped them dodge a cybercrime, you'll become a cyber hero.


Clic here to read the story from its source.