Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, March 21, 2012

When Online Attacks Are Beneficial

Posted on 12:24 PM by Unknown

    Rebecca Kutzer-Rice







  • Although hacking attacks threaten company data and expose confidential information, they also reveal weaknesses in IT security and help businesses better prepare for future attacks. Recent hacking events have highlighted how companies can use hacking incidents to their advantage.





  • Although online security continues to improve, with breakthroughs in detection and defense, hackers continue to threaten the safety of companies’ information. Recent attacks by hackers like Anonymous, for instance, successfully shut down the sites of major businesses and government organizations, including the FBI. A recent article in the New York Times, titled “The Bright Side of Being Hacked” highlights not the damages caused by hackers, however, but the benefits that a hacker attack can provide.

    According to the article, most hacker attacks do not cause irreparable damage to a company or expose confidential information. Attacks do, however, reveal security damages in a company’s computer systems and employees poorly trained in smart computer habits. Weak passwords and insecure email are often the open doors hackers use to gain access to company info.
    “Any company that is patting themselves on the back and saying that they’re not a target or not susceptible to attack is in complete and utter denial,” Roger Cressey, senior vice president of Booz Allen Hamilton, told the NYTimes. His company is a defense contractor whose computer systems were threatened during last year’s Anonymous attacks.
    At a recent conference, Robert Mueller, director of the FBI, addressed the reality of hacking threats. “There are only two types of companies,” Mueller said, according to the NYTimes, “those that have been hacked and those that will be.”
    The latest attacks also highlight a new trend in hacking called online espionage. In this type of attack, companies take advantage of computer vulnerabilities to discover information about competing firms.
    Hacking events, however, expose existing vulnerabilities in online security and help companies better protect themselves from future threats. If weak passwords are to blame, for instance, a business might host seminars for employees about how to ensure Internet security.
    Tracking how other companies are attacked can also better prepare businesses to protect themselves from hackers. Since recent attacks, for example, take advantage of unencrypted email accounts, companies might work to improve email security.
  • Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
    Posted in Tech News Security | No comments
    Newer Post Older Post Home

    0 comments:

    Post a Comment

    Subscribe to: Post Comments (Atom)

    Popular Posts

    • When touring the Large Hadron Collider, stay with your group
    • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
      By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
    • Quantum Computing Almost Here
      R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
    • Wet Electronics Open Door to New Possibilities
      R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
    • 2012 Salary and Skills report
      http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
    • Medical Privacy Secured on Smartphones
      R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
    • Entry-level IT jobs will be plentiful in 2012, experts predict
      Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
    • Rise of the 'maker movement'
      Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
    • (no title)
      Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
    • Melissa Harris-Perry: World wide web access to local communities
      Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

    Categories

    • Android (1)
    • BDPA (3)
    • BDPA Local Chapter (3)
    • Career Networking (20)
    • Cool Stuff (14)
    • Education Tech (8)
    • Election (1)
    • FoodforThought (32)
    • FreeStuff (2)
    • Funny (2)
    • Green Power (7)
    • Hackerspace (6)
    • Local Tech Events (2)
    • Med Tech News (9)
    • Money (1)
    • MovieTech (1)
    • New Technology (5)
    • Open Source Tech News (7)
    • Personal Achievement (1)
    • personal rant (1)
    • Presidental (2)
    • SocialNetworkTech (1)
    • Space Tech (10)
    • Tech News (35)
    • Tech News Security (12)
    • Tech Tip (5)
    • Tech Tips (1)
    • Tech Toys (2)

    Blog Archive

    • ►  2013 (202)
      • ►  September (6)
      • ►  August (21)
      • ►  July (17)
      • ►  June (17)
      • ►  May (26)
      • ►  April (23)
      • ►  March (32)
      • ►  February (28)
      • ►  January (32)
    • ▼  2012 (200)
      • ►  December (27)
      • ►  November (31)
      • ►  October (33)
      • ►  September (12)
      • ►  August (14)
      • ►  July (5)
      • ►  June (9)
      • ►  May (13)
      • ►  April (9)
      • ▼  March (24)
        • Open-source designs for your very own tricorder no...
        • LG kicks off production of e-paper displays
        • 3-D printer with nano-precision sets world record
        • Food for thought; Career items
        • Rise of the 'maker movement'
        • By Erik EckelMarch 26, 2012 Takea...
        • When Online Attacks Are Beneficial
        • Play Now Aurora Seen from Space NASA releases bre...
        • Nintendo Wii Diagnoses Eye Malady
        • Motivational Moment
        • Focus: HOPE is hosting a FREE Open House and Caree...
        • Has Jim Crow Moved To Silicon Valley? Racism In Th...
        • Wordless tribute to a machine that moved millions ...
        • Flying model of the DeLorean from Back to the Futu...
        • Breakthrough could make smartphones and laptops 1,...
        • Where 4,000,000 Phones a Year Go to Be Resurrected
        • Tiny Linux computer punches above its weight
        • Six minutes of terror
        • Motivational Monday
        • 10 low-stress jobs for IT pros
        • Neil deGrasse Tyson: 'When A Nation Dreams Big, It...
        • Toy Dept.: Parrot AR.Drone 2.0 Visits WWJReporting...
        • Motivational Moment
        • Quantum Computing Almost Here
      • ►  February (10)
      • ►  January (13)
    • ►  2011 (95)
      • ►  December (10)
      • ►  November (27)
      • ►  October (18)
      • ►  September (11)
      • ►  August (24)
      • ►  July (5)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile