World Scout Jamboree disaster blamed on South Korean government    Hajj Ministry warns against fake companies    Saudi Arabia starting direct flights between Dammam and Najaf    Egyptian delegation arrives in Israel to revive deadlocked ceasefire and hostage talks    Minister of Defense celebrates graduation of King Abdulaziz military college cadets    TGA introduces uniform for bus drivers    Ministry uncovers misuse of mosque utilities during inspection    Health Ministry reports 15 food poisoning cases linked to one establishment in Riyadh    Saudi Arabia supports UNRWA's efforts for Palestinian refugees, urges donor commitment    Supreme Court appears ready to reject Trump's immunity claims    Indian voters battle extreme temperatures as intense heat wave hits region    'Zarqa Al Yamama': Riyadh premieres first Saudi opera    Riyadh Season announces first overseas event with boxing gala in Los Angeles    Al-Ahsa Airport to double capacity to accommodate 100 million passengers a year    Al Hilal's comeback effort falls short in AFC Champions League semi-finals    Belgian man whose body produces alcohol in rare condition acquitted of drunk driving    Australian police launch manhunt for Home and Away star Orpheus Pledger    Spice Girls reunite at Posh's 50th birthday    Swedish rider Eckermann wins 2024 Show Jumping World Cup in Riyadh    Aspiring fencer Josh Brayden aims for Olympic glory    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Shielding company against cybercrime
Published in The Saudi Gazette on 12 - 08 - 2014


Richard Anning*
Technology brings a lot of great opportunities for business, enabling companies to do things today that were unthinkable only a few years ago. However, as with most opportunities, there are associated challenges. Over recent years, cyber crime has become big business – the cost has been calculated globally at $114 billion a year, and it was one of the major world threats discussed at the last couple of World Economic Forum events in Davos. It is especially relevant to the Middle East, according to the president of McAfee Europe and Middle East last year, the Middle East is one of the areas with the highest cyber crime activity.
There are various reasons for this.
Firstly, the world is ‘cyber' now; almost everything and everyone is online, whether business or personal. What has really changed the game has been the development of mobile technology – smartphones and tablets – which are especially popular in the Middle East. In the UAE, for example, smartphones have around 73 percent penetration. Smartphones and tablets typically have fewer anti-virus protections than computers and are therefore easier to hack. Moreover, culturally it can be the case that people are not as security-aware with mobile devices as they are with, for example, their laptops.
Secondly, social networking has really raised the bar. The world now spends around 110 billion minutes each month on social media. Twitter has more than 200 million users, whilst Facebook has over one billion. This has given rise to what is termed ‘spear fishing', where criminals can approach potential victims posing as people that they know in order to gain their trust or private details. Finally, we have seen tremendous growth in developments like cloud computing and ‘Bring Your Own Device'. Combined with the increasing prevalence of outsourcing, and more people have access to companies' important data, on a variety of devices, with varying degrees of protection and security awareness. Many users are not as security conscious as they might be with traditional internet platforms such as computers. As people have more devices, it seems they are becoming more relaxed about security; a survey by Norton Cyber crime found 41 percent of users in Singapore did not use complex passwords or change their password frequently.
When cyber crime attacks are successful, they can have potentially catastrophic consequences. In August 2012 a virus wiped 30,000 computer hard drives at Aramco, the Saudi national oil producer. It is estimated that around 75 percent of cyber crime is financially motivated rather than vandalism, and there are a number of attractions for criminals. The most lucrative is financial fraud, but data theft is also a motivation. This is no longer limited to commercially sensitive data or intellectual property. Departments like HR and Legal Affairs used to be viewed as comparatively low risk, but the data they hold can be very useful to criminals. Customer data, if stolen, can be sold on to third parties. And finally, simple business disruption can be an end in itself. Potential losses are not limited to the value of something stolen, or business missed. The cost of investigating, reporting, analysing solutions and replacing protection technology can also be significant. Companies could also face fines in some jurisdictions, for example in the Dubai International Financial Centre, if they are judged to have negligently breached data protection laws.
How can businesses protect themselves against cyber criminals? ICAEW's recent Audit Insights: Cyber Security report suggests it is critical that a business identifies their key information assets and take extra care to protect those. It is estimated that getting the basic cyber hygiene right can reduce the risk of a cyber breach by as much as 80 percent. It is therefore vital that those at the top are aware and sensitive to cyber threats and best practice. As technology is constantly shifting, it can be that some employees are not completely up to speed with the latest developments. However, they are also the most likely targets for criminals. As the tone in companies is set from the top, having cyber-savvy leadership should translate into a cyber risk-aware culture throughout the organization. Cyber skills should be shared and regular training made available for employees. It is critical that they have access to the knowledge and processes that will allow them to protect the company. Regular re-assessment of potential threats is also needed. Unfortunately, the nature of technology means that threats are constantly changing, and the ways in which a company can be attacked changes frequently.
These are all good preventative measures, but companies also need to make sure that there are plans in place for when something does go wrong. This means having clear and transparent policies on how to respond in the event of a cyber-attack, or if a crime is discovered. After all, many companies have good response plans to ensure business continuity in the event of other disasters, and cyber crimes can and should be treated in the same way. Companies should also be prepared to share knowledge internally and with peers, as this will contribute greatly to fighting against cyber crime more widely. This enables companies to build a picture of the reality of the threats facing businesses, governments and consumers alike.
Cyber crime can sometimes seem like a frightening and mysterious threat, partly owing to the high levels of technical knowledge involved in understanding exactly how it works, or the fact that it takes place in a virtual environment. Moreover, rapid and continuous developments in technology mean that it can seem like it will be impossible to ever counter. The fact is that it is not that different to other crimes, except the medium and method. Technology has enabled businesses to do many things that were unthinkable half a century ago, but along with this has come the potential to abuse these new methods of data storage and communication. By ensuring they are more aware of the potential threats and countermeasures, companies can make sure they are in a position to manage the risks of cyber crime as they would any other threat.
*The writer is head of ICAEW's IT Faculty


Clic here to read the story from its source.