Cyber threats everywhere: Cybercrime law not enough without good implementation

THE word threat is a mild way of indicating danger. It however carries   seriousred alert   with it. It becomes more dangerous when it grows within the ICT Ecosystem. This is basically because technology has erased the borders separating local and international markets, developed and underdeveloped economies, small and big businesses.GlobalvillageDirector, Public Affairs, NCC, Mr Tony Ojobo, and other staff welcome Prof Danbatta to his first day in office as NCC EVCWhat this means is that with technology reducing the world to a mere global village, a threat to one is largely a threat to all.   This is also why smaller economies should harken when the big economies shout over developments that limit growth.From every corner, reports are emerging that cyber attacks are imminent not only to big Organisations but also the smaller ones with the same kind of styleand intent. Today’s cybercriminals are sophisticated and ruthless: they prey onthe weaknesses in a network, approaching any security layer as an open invitation to try to hack it.Meanwhile security professionals and organizations alike have been advised to endeavor to understand the nature of the latest exploits and how their networks are potentially impacted, in order to protect themselves against attacks,Highlights to two latest reports; one from Cisco and another from Checkpoint reveal the dynamic nature the threats have become that it takes the properly vigilant professional to cope with.Sophisticated attacks:Cisco Midyear Security Report   released at the weekend, shows that Cyber attacks is increasingly becoming more pronounced in a sophiscated form.It said the need for organizations to reduce time to detection is critical in order to remediate against sophisticated attacks by highly motivated threat actors. The report observed that adversaries continue to innovate as they slip into networks undetected and evade security measures. One of the key finding in study is that exploits of Adobe Flash vulnerabilities are increasing. They are regularly integrated into widely used exploit kits such as Angler and Nuclear.Angler continues to lead the exploit kit market in terms of overall sophistication and effectiveness. The Angler Exploit Kit represents the types of common threats that will challenge organizations as the digital economy and the Internet of Everything (IoE) create new attack vectors and monetization opportunities for adversaries.The report revealed that the innovation race between adversaries and security vendors is accelerating, placing end users and organizations at increasing risk. It recommended that Vendors be vigilant in developing integrated security solutions that help organizations to be proactive and align the right people, processes, and technology.According to the General Manager, Cisco Nigeria, Ghana, Liberia and Sierra Leone, Mr. Dare Ogunlade, “Organizations in Nigeria cannot just accept that compromise is inevitable, even if it feels like it today.” He warned that technology industry must up the game and provide reliable and resilient products and services, and the security industry must provide vastly improved, yet meaningfully simplified, capabilities for detecting, preventing, and recovering from attacks.Mobile devices vulnerable:Meanwhile, Latest security study by Check Point Technologies Limited has revealed a rise in zero-day attacks on mobile devicesand networks as the biggest threat to today’s enterprise. The 2015 report is the company’s third annual report revealing the major security threats that impacted organizations across the world.The security report, among other things provided insight into the major security events that occurred in organizations across the world and offers recommendations on how to protect against them. The study also provided insight into the degree of infiltration and sophistication of new threats in the enterprise.However, the report is based on collaborative research and in-depth analysis from security events found in more than 1,300 businesses from all industries around the globe, 1 million devices, and from events discovered through Check Point ThreatCloudTM, which is connected to security gateways of more than 16,000 organizations and from more than 3,000 gateways reporting to the Check Point Threat Emulation Cloud.While organizations often forget about the security implications that arise when they lack the proper security implementations, the report further revealed the prevalence and growth of threats on enterprise networks, throughinformation obtained over the course of 2014.President of Check Point Software Technologies, Amnon Bar-Lev, said:  “Only by arming themselves with a combination of knowledge and strong security solutions can organizations truly protect themselves against these evolving threats. By making security a critical asset to their business, you can turn security into an enabler. And in doing so, you’re able to unlock innovation andfoster an environment for high performance and productivity”.According to him, “Mobile devices are the weak links in the security chain, providing easier direct access to more valuable organizational assets than any other intrusion point. Check Point research found that for an organization with more than 2,000 devices on its network, there’s a 50 percent chance that there are at least 6 infected or targeted mobile devices on their network.Cybercrime Act  not enoughHowever, at the recently concluded general election of the Nigerian Computer Society, NCS, participants urged government to give the cybercrime law some teeth with adequate implementation strategy in place. They also argued that with the volume of data being generated on minute-by-minute basis, the participants demanded best companies to leverage on   the benefits of ‘big data’ for economic development..Although IT experts at the forum advised the Federal Government to leverage on big data to improve the state of the economy, there was also issue of the preparedness of the country to adopt the new technology which is becoming the toast of IT community.While President Muhammadu Buhari had assured in his inaugural speech that   the present administration would tackle issues around terrorism, financial crime and cybercrime and other challenges of the 21st century, majority of speakers at the NCS conference with the   theme, IT for inclusive development noted that critical information infrastructure (CII) must be protected   as an essential asset for national development and security.

Advertisements