We constantly refer to different battles in the fight against cybercrime, from multi-factor authentication to cyber security training, best practices are being employed everywhere, by force.
The GDPR is up and running and as Western democracies hook in to the fact that we are inevitably moving towards a virtual future, we lead the way in cyberwarfare against economically, politically and anti-socially motivated cyber criminals who are hell-bent on disrupting our world.
Yet, regardless of all our efforts we remain a few phases behind our cyber foes, the hackers, and as cyber technology dominates more and more public space, these few glaring aspects are likely to become larger and much more treacherous.
Actually, to be precise, these few phases are threefold and we need to address them as they prop up both our dependence on virtual technology and our vulnerability.
- Skill sets.
Networked devices are everywhere and everyone has one, especially since the inception of the smartphone. Mobile networking supports both voice and/or data network connectivity through a wireless network, via radio transmission giving smartphone users the ability to swipe their ‘WiFi’ networks on and get themselves connected wherever they are.
The phenomenal speed of networked communication between multiple devices has in this way, exceeded all expectations.
None of this is news obviously and you may, indeed, be reading this blog, on your cell phone through your WiFi connection right now, but it’s worth taking a moment to realize quite how incredible the spread of networked devices is. To say that 30 years ago there were approximately 750 million network devices globally, by 2012 this is easily multiplied by ten and within 2 years it is suggested will reach 75 billion network devices worldwide, is astronomical.
[Cyberhub Summit is Coming back to Atlanta, Ga | October 9-10, 2018 - Cyber Security education for executives and business owners and Powerful Networking. | Get the latest from Cyberhub Summit by signing up for their newsletters. ]
More networked devices, more victims, and many more cyber opportunists.
With our surplus of cell phones comes an excess of data. This comes from a variety of areas, including the myriad of IoT devices.
Our homes and lives are filled with a network of objects that feature an IP address for internet connectivity and communicate with other Internet-enabled devices and systems. If you can’t think of any examples, think:
- Video surveillance
- Amazon echo
This creates a situation where we have an ever-increasing store of data, which it is becoming increasingly hard to protect.
We have an acute shortage of skilled cyber security personnel and the gap is growing. Our education systems, boot camps and workshops are currently failing to train our upcoming workforce on how to secure information and with the expansion in data and devices, trained workers will be unable to keep up with market demands.
Although steps are being taken to utilize both machine learning and A.I to redress the balance, through software developments, such as Respond Software which provides robotic complex security defence systems, we aren’t ready.
There is a unique fear of automated security that regardless of our inability to handle the pure volume of cybersecurity professionals needed prevents the potential bot revolution in cyber security, bottom line, we trust our own, and we want human eyes and hands to control our cyber security,
We are moving towards an unresolvable and unavoidable conundrum in cyber security. We dig deep into our pockets to prevent the huge growth of ‘hack-tunists’ yet we can’t stop expanding our dependence on virtual tech which inevitably fuels the growth of cybercrime.