Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.
There are several reasons this happened, but one has haunted me most: Hillary Clinton's leaked emails. Since the "scandal" broke, I've become terrified of hacking. This isn't because I may run for President myself (#SLH2020), but because the vulnerability of the Clinton campaign's email accounts bodes badly for the rest of us.
The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.
Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.
To build a booming market for talent, this should include subsidised training for individuals and corporates, apprenticeships and particularly a strong effort or financial incentives to grow the take up and offerings of Cyber Security degrees. Promotion and awareness of the industry and the opportunities available needs to be wide reaching.
However, our constantly connected culture brings great risks, such as identity fraud, harassment and theft. Beyond a handful of pictures, emojis and light-hearted messages, we have very little knowledge of a person's true intentions or motives when they are positioned behind a social media account or dating profile.
In a bid to stem the tide of digital radicalisation by terrorist groups such as Islamic State, the European Parliament has approved plans for new legislation which will allow rapid and widespread removal of extremist content from the internet. Digital rights activists are up in arms over the decision, which they fear will lead to private organisations policing and censoring internet users with impunity.
Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.