From recent cases in the media, involving major organizations such as Bank of America, America Online, Berkeley University, Time Warner, and Ralph Lauren, ID theft can have severe consequences, such as direct loss of revenue and stock decline. There are also other major intangible side-effects that can result from a breach of personal data, such as brand damage, loss of customer confidence, and decline in service. The question is, would you do business with an organization that had recently lost thousands or millions of users’ personal data to hackers and scam artists?
For most, the answer would be no. It is clear that something must urgently be done to assure users, both internally and externally, connecting to applications and data from any location using a number of different connectivity methods, such as laptops, home PCs, PDAs, and smart phones.
Where to start
It used to be that all attacks and security breaches took place on the edge of the organization’s network, centered on the firewall. So naturally, organizations focused on enhancing security in the network to ensure nobody could break through the outside perimeters.
Recently, this has all changed. A number of different threats change the way we think about security and how we protect the information most valuable to us.
- Trojans – programs that get installed on a users device and alters the behaviour of that device without the user knowing it.
- Keyloggers – programs that capture the keystrokes of a user and sends it back to a third party.
- Screen-scrapers – programs that capture screen information on a users device.
- Password sniffers – programs that detect what passwords are being used.
- Viruses – code that infects a users device and often destroys data and settings on that device.
Figure 1. The location of threats and attacks have moved from the edge of the network to user devices.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.