Sunday, May 13, 2012

Hacking Communities?

By Daniel Turbin


You've probably heard that hackers are generally 'lone wolf' types who operate unconditionally on their lonesome, and there's some truth to that. Hackers do tend to be highly individualistic folk, each with his ( or her ) own way of doing things, but don't let that fool you.

Increasingly, hackers are banding together in groups, sharing data, swapping stories, sharing secrets, and similar and this makes them orders of magnitude more threatening to you and to the safety of your firm's information.

It's not a new phenomenon, either. In the youth of the web, the group called The Legion of Doom made waves by hacking into numerous systems that everybody presumed were carefully protected and nigh on not possible to breech. More recently, the group called 'Anonymous' has made similar headlines.

The particular dangers that groups like these pose is twofold. From one perspective, when you put these extremely clever, independent minded people in a room together ( virtual or otherwise ), and see them start sharing their techniques and stories of their exploits with each other, they can, in the course of a single night's conversation, come up with radical new ways to breech systems that leave the network security sellers selling business grade product scrambling to think up an adequate reply.

On the other, the formation of such groups usually lead directly to what you might call 'intramural rivalries,' and to show its superiority over other such groups, each will redouble their attempts to outshine the others. Each will work more conscientiously to break the supposedly unbreechable system.

Unfortunately, if you run a company whose really existence depends on your information ( and increasingly, this applied to pretty much every company conducting business ), that places you in a spot you do not need to be. Precisely in their cross-hairs.

Because of this, you owe it to oneself and to your company to have the best web security you doubtless can, which includes your policies and procedures, software solutions, and periodic audits to ensure that everything is as solid as you can potentially make it. Remember, you have got to protect everything simultaneously. All points of entry must be guarded. The hacker only needs to find a single chink in your virtual armor to gain entrance. Do not let that occur.



No comments:

Post a Comment