FEBRUARY - MARCH 2024AUTOTECHOUTLOOK.COM8IN MY OPINIONBy Alex Konnaris, Group CIO, RMA GroupLooking back over the years, we have seen many kinds of security threats. If we were lucky, none of them impacted our data, at worst some of them caused some minor disruptions. Information Security is an enormous topic and there is a good reason for it, the threats to our data are real. Threats have changed in size and scope, so we are no longer able to ignore them. We used to be able to say to ourselves "I'm not important enough to be a target" but this is not true in today's day and age. The reason relates to the exponential growth of computing power, internet bandwidth, storage capabilities and availability of tools. The dark-web is now populated by seriously motivated organized groups, with the intent on making revenue or cause major disruption - cyber-crime is a huge industry and it is growing. The tools are widely available and more sophisticated, all that's needed is some information, a little automation and watch the fireworks remotely. Whether they are a simple hobbyist or part of a large criminally minded organization, data is either publicly available, can be mined or purchasable for a few dollars on the Dark-Web. Hackers don't really need to know who the targets are or what they are worth, they are only interested in compromising systems and any bonus of making some money. If you are still asking yourself "why me?", its rarely related to your computer systems, it's the general availability of data combined with compute power. Large amounts of seemingly subtle information enable others to build it into something valuable. It's happening every day in the connected world, so much so that we rarely question it. In the same way as our personal data, we are also giving way snippets of data that pertain to our computing systems, we are being tracked at one level or another. The result in today's climate: we are all targets. In terms of delivery mechanism, over 90 prcent of threats come from email, it is the perfect platform to reach most of Alex KonnarisSECURITY THREATS AND BACKUPS
< Page 7 | Page 9 >