Home Security Hackers boast of ease of bypassing security
Hackers boast of ease of bypassing security Image courtesy of Stuart Miles at FreeDigitalPhotos.net Featured

Most professional hackers say they could bypass security systems, locate critical data, and exfiltrate that data within 15 hours, and they label defence measures such as firewalls and antivirus as trivially easy to bypass.

According to research published by the Australian arm of US-based cyber security, risk, and compliance software company Nuix in its Black Report, there’s a huge gap between perception and reality in cyber security.

“You might think you’re well protected, but the people whose job it is to break in and steal your data think otherwise,” warns Chris Pogue, lead author of the report and Nuix’s head of Services, Security and Partner Integration.

“For example, most organisations invest heavily in perimeter defences such as firewalls and anti-virus, and these are mandatory in many compliance regimes, but most of the hackers we surveyed found these countermeasures trivially easy to bypass. If hackers can steal your data within a day, but you only find out it happened months later, you’re well on the way to becoming the next big news story.”

According to Pogue, the Nuix report challenges the common media narrative that data breaches are hard to prevent because cyber attacks are becoming more sophisticated and, he notes that nearly a quarter of Black Report respondents (22%) said they used the same attack techniques for a year or more.

“Hackers can keep using the same attack techniques because they still work – if it ain’t broke, don’t fix it,” said Pogue.

“Again and again in the media, data breach victims claim they suffered unprecedented and highly sophisticated cyber attacks, but the reality turns out to be that someone didn’t do their job properly. In the recent Equifax case, it was simply an older system that hadn’t been patched.”

Pogue claims the report also shatters another common perception of cyber security, “that of the teenage hacker living in a basement”.

The report found that three-quarters of respondents were college graduates and nearly one-third (32%) had post-graduate degrees. The majority (57%) worked for medium-sized, large, or enterprise businesses.

“When organisations develop their cyber security strategies, they may have IT, legal, risk, and human resources teams at the table but the one person they never invite is the bad guy,” Pogue said. “It’s no wonder that so many security strategies are misdirected.

“The Nuix Black Report 2018 is an opportunity to bring the adversary to the table and have the hackers themselves tell you what’s most effective for your security efforts.”

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Peter Dinham

Peter Dinham is a co-founder of iTWire and a 35-year veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect