Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 was the “worst year ever” for cyberattacks, and I am sure that 2018 is shaping up to take that title.
As hyper-connectivity continues to be the norm, with most of us using multiple devices – on the go – that connect to multiple networks throughout the day, the risks to businesses are growing exponentially. To effectively protect an enterprise today, you must not only know who is connecting to your network, but also who is targeting it for compromise and what their tactics may be.
To understand that requires a proactive approach backed by the expertise of cyber professionals who are well-versed in the craft of cybersecurity. In the past, protection was all about the perimeter of a business. Today, detection and protection fall more on the individual device. Additionally, as social media and phishing scams become more sophisticated, you must be able to follow the threads those scams may leave to find out what else potential attackers are doing to try to get into your network.
I have been working in the world of cybersecurity for almost 20 years. As I shared in a history of ShadowDragon, in 2010 my team and I began investigating malicious online activities against our clients before anyone knew what to call it or how to execute this type of research.
I am pleased to bring insights into this aspect of cybersecurity to the 3rd Annual Alabama Cyber Now (ACN) conference this week in Birmingham. I will be speaking this Thursday on Disrupting Human Trafficking Networks using Social Media & Online Monitoring Tools (aka threat intelligence).
“Cybersecurity is everyone’s business in today’s fast-paced IT-based society,” according to ACN hosts TechBirmingham, the Central Alabama Chapter of the Information Systems Security Association (Central Alabama ISSA) and the InfraGard Birmingham Members Alliance. That holds true whether you are a business owner, an employee or a vendor to other businesses.
I hope to see you at ACN this week, as I join other Alabama cyber experts and share the latest threat intelligence on human trafficking and help attendees learn to identify activity and prepare to combat it.
ShadowDragon is proud to be a gold-level sponsor of the 3rd Annual ACN.
With extensive experience in defensive and offensive security, Daniel has been a quiet trailblazer in digital intel-gathering long before cyber intelligence became a discipline. More than a decade ago he was inventing and applying his own intelligence tools in support of companies and governments around the world facing urgent threats. Using this deep understanding of web technologies and the behaviors of cybercriminals, he has enhanced, updated and packaged these tools under ShadowDragon.
Daniel is a member of the Odonata Holdings, Inc.